From 9837ec68abff61ff134dbbc0429cfad1c7f28a8e Mon Sep 17 00:00:00 2001 From: "github-actions[bot]" <41898282+github-actions[bot]@users.noreply.github.com> Date: Fri, 3 Apr 2026 12:14:46 +0000 Subject: [PATCH] [bot](2026-04-03 12:14:45) Sync SDK with OpenAPI spec --- docs/ApiVulnCheckCanary.md | 3 + docs/IndicesApi.md | 308 +- openapi.json | 2 +- pyproject.toml | 2 +- python-generator-config.yaml | 2 +- setup.py | 2 +- test/aio/test_api_vuln_check_canary.py | 3 + test/aio/test_indices_api.py | 14 + ...i_vuln_check_canary_paginate_pagination.py | 3 + test/blocking/test_api_vuln_check_canary.py | 3 + test/blocking/test_indices_api.py | 14 + ...i_vuln_check_canary_paginate_pagination.py | 3 + vulncheck_sdk/__init__.py | 2 +- vulncheck_sdk/aio/__init__.py | 2 +- vulncheck_sdk/aio/api/indices_api.py | 12403 +++++++++------- vulncheck_sdk/aio/api_client.py | 2 +- vulncheck_sdk/aio/configuration.py | 2 +- .../aio/models/api_vuln_check_canary.py | 8 +- vulncheck_sdk/api/indices_api.py | 12403 +++++++++------- vulncheck_sdk/api_client.py | 2 +- vulncheck_sdk/configuration.py | 2 +- vulncheck_sdk/models/api_vuln_check_canary.py | 8 +- 22 files changed, 14179 insertions(+), 11014 deletions(-) diff --git a/docs/ApiVulnCheckCanary.md b/docs/ApiVulnCheckCanary.md index a1c289e2..671a2109 100644 --- a/docs/ApiVulnCheckCanary.md +++ b/docs/ApiVulnCheckCanary.md @@ -15,6 +15,9 @@ Name | Type | Description | Notes **severity** | **int** | | [optional] **signature** | **str** | | [optional] **signature_id** | **int** | | [optional] +**src_as_domain** | **str** | | [optional] +**src_as_name** | **str** | | [optional] +**src_asn** | **str** | | [optional] **src_country** | **str** | | [optional] **src_ip** | **str** | | [optional] **src_port** | **int** | | [optional] diff --git a/docs/IndicesApi.md b/docs/IndicesApi.md index 6806dfba..0a4e9729 100644 --- a/docs/IndicesApi.md +++ b/docs/IndicesApi.md @@ -220,7 +220,9 @@ Method | HTTP request | Description [**index_hkcert_get**](IndicesApi.md#index_hkcert_get) | **GET** /v3/index/hkcert | Return vulnerability data stored in index \"hkcert\" [**index_hms_get**](IndicesApi.md#index_hms_get) | **GET** /v3/index/hms | Return vulnerability data stored in index \"hms\" [**index_honeywell_get**](IndicesApi.md#index_honeywell_get) | **GET** /v3/index/honeywell | Return vulnerability data stored in index \"honeywell\" +[**index_hp_eol_get**](IndicesApi.md#index_hp_eol_get) | **GET** /v3/index/hp-eol | Return vulnerability data stored in index \"hp-eol\" [**index_hp_get**](IndicesApi.md#index_hp_get) | **GET** /v3/index/hp | Return vulnerability data stored in index \"hp\" +[**index_hpe_eol_get**](IndicesApi.md#index_hpe_eol_get) | **GET** /v3/index/hpe-eol | Return vulnerability data stored in index \"hpe-eol\" [**index_hpe_get**](IndicesApi.md#index_hpe_get) | **GET** /v3/index/hpe | Return vulnerability data stored in index \"hpe\" [**index_huawei_euleros_get**](IndicesApi.md#index_huawei_euleros_get) | **GET** /v3/index/huawei-euleros | Return vulnerability data stored in index \"huawei-euleros\" [**index_huawei_ips_get**](IndicesApi.md#index_huawei_ips_get) | **GET** /v3/index/huawei-ips | Return vulnerability data stored in index \"huawei-ips\" @@ -30304,6 +30306,144 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) +# **index_hp_eol_get** +> RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination index_hp_eol_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + +Return vulnerability data stored in index \"hp-eol\" + +### Overview +This endpoint allows you to retrieve a paginated list of all documents from the hp-eol index. \ +By default, a maximum of 100 documents are shown per page. + +**Index Description:** End of Life Data for Hewlett-Packard Products + +### Paging Over Large Data (cursor) +In order to allow users to iterate over large index datasets, this endpoint provides a server-side +"cursor" mechanism. To use the cursor, first call `GET /index/hp-eol?start_cursor`, the response will +have a `next_cursor` id that clients will need to pass as a query parameter to the next request like +`GET /index/hp-eol?cursor=` + + +### Example + +* Api Key Authentication (Bearer): + +```python +import vulncheck_sdk +from vulncheck_sdk.models.render_response_with_metadata_array_advisory_generic_eol_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination +from vulncheck_sdk.rest import ApiException +from pprint import pprint + +# Defining the host is optional and defaults to https://api.vulncheck.com +# See configuration.py for a list of all supported configuration parameters. +configuration = vulncheck_sdk.Configuration( + host = "https://api.vulncheck.com" +) + +# The client must configure the authentication and authorization parameters +# in accordance with the API server security policy. +# Examples for each auth method are provided below, use the example that +# satisfies your auth use case. + +# Configure API key authorization: Bearer +configuration.api_key['Bearer'] = os.environ["API_KEY"] + +# Uncomment below to setup prefix (e.g. Bearer) for API key, if needed +# configuration.api_key_prefix['Bearer'] = 'Bearer' + +# Enter a context with an instance of the API client +with vulncheck_sdk.ApiClient(configuration) as api_client: + # Create an instance of the API class + api_instance = vulncheck_sdk.IndicesApi(api_client) + page = 56 # int | set the page number of the response (optional) + limit = 56 # int | limit the number of findings in the response (optional) + cursor = 'cursor_example' # str | continue server-side paging using a cursor id (optional) + start_cursor = 'start_cursor_example' # str | request server-side paging (optional) + order = 'order_example' # str | direction of the sort (optional) + sort = 'sort_example' # str | field by which to sort the results (optional) + cve = 'cve_example' # str | Specify a CVE ID to search with. (optional) + alias = 'alias_example' # str | Specify a vulnerability alias to search with. (optional) + iava = 'iava_example' # str | Specify an IAVA ID to search with. (optional) + jvndb = 'jvndb_example' # str | Specify a JVNDB ID to search with. (optional) + ilvn = 'ilvn_example' # str | Specify an ILVN ID to search with. (optional) + threat_actor = 'threat_actor_example' # str | Specify a threat actor name to search with. (optional) + mitre_id = 'mitre_id_example' # str | Specify a MITRE ID to search with. (optional) + misp_id = 'misp_id_example' # str | Specify a MISP ID to search with. (optional) + ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) + botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) + published = 'published_example' # str | Specify a published date (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) + updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) + updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) + last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) + last_mod_end_date = 'last_mod_end_date_example' # str | Specify an ending last modified date to filter with. (optional) + pub_start_date = 'pub_start_date_example' # str | Specify a starting published date to filter with. (optional) + pub_end_date = 'pub_end_date_example' # str | Specify an ending published date to filter with. (optional) + + try: + # Return vulnerability data stored in index \"hp-eol\" + api_response = api_instance.index_hp_eol_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + print("The response of IndicesApi->index_hp_eol_get:\n") + pprint(api_response) + except Exception as e: + print("Exception when calling IndicesApi->index_hp_eol_get: %s\n" % e) +``` + + + +### Parameters + + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **page** | **int**| set the page number of the response | [optional] + **limit** | **int**| limit the number of findings in the response | [optional] + **cursor** | **str**| continue server-side paging using a cursor id | [optional] + **start_cursor** | **str**| request server-side paging | [optional] + **order** | **str**| direction of the sort | [optional] + **sort** | **str**| field by which to sort the results | [optional] + **cve** | **str**| Specify a CVE ID to search with. | [optional] + **alias** | **str**| Specify a vulnerability alias to search with. | [optional] + **iava** | **str**| Specify an IAVA ID to search with. | [optional] + **jvndb** | **str**| Specify a JVNDB ID to search with. | [optional] + **ilvn** | **str**| Specify an ILVN ID to search with. | [optional] + **threat_actor** | **str**| Specify a threat actor name to search with. | [optional] + **mitre_id** | **str**| Specify a MITRE ID to search with. | [optional] + **misp_id** | **str**| Specify a MISP ID to search with. | [optional] + **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] + **botnet** | **str**| Specify a botnet name to search with. | [optional] + **published** | **str**| Specify a published date | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] + **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] + **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] + **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] + **last_mod_end_date** | **str**| Specify an ending last modified date to filter with. | [optional] + **pub_start_date** | **str**| Specify a starting published date to filter with. | [optional] + **pub_end_date** | **str**| Specify an ending published date to filter with. | [optional] + +### Return type + +[**RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination**](RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination.md) + +### Authorization + +[Bearer](../README.md#Bearer) + +### HTTP request headers + + - **Content-Type**: Not defined + - **Accept**: application/json + +### HTTP response details + +| Status code | Description | Response headers | +|-------------|-------------|------------------| +**200** | OK | - | +**404** | Not Found | - | +**500** | Internal Server Error | - | + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + # **index_hp_get** > RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination index_hp_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) @@ -30442,6 +30582,144 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) +# **index_hpe_eol_get** +> RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination index_hpe_eol_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + +Return vulnerability data stored in index \"hpe-eol\" + +### Overview +This endpoint allows you to retrieve a paginated list of all documents from the hpe-eol index. \ +By default, a maximum of 100 documents are shown per page. + +**Index Description:** Hewlett-Packard Enterprise End of Life Data + +### Paging Over Large Data (cursor) +In order to allow users to iterate over large index datasets, this endpoint provides a server-side +"cursor" mechanism. To use the cursor, first call `GET /index/hpe-eol?start_cursor`, the response will +have a `next_cursor` id that clients will need to pass as a query parameter to the next request like +`GET /index/hpe-eol?cursor=` + + +### Example + +* Api Key Authentication (Bearer): + +```python +import vulncheck_sdk +from vulncheck_sdk.models.render_response_with_metadata_array_advisory_generic_eol_paginate_pagination import RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination +from vulncheck_sdk.rest import ApiException +from pprint import pprint + +# Defining the host is optional and defaults to https://api.vulncheck.com +# See configuration.py for a list of all supported configuration parameters. +configuration = vulncheck_sdk.Configuration( + host = "https://api.vulncheck.com" +) + +# The client must configure the authentication and authorization parameters +# in accordance with the API server security policy. +# Examples for each auth method are provided below, use the example that +# satisfies your auth use case. + +# Configure API key authorization: Bearer +configuration.api_key['Bearer'] = os.environ["API_KEY"] + +# Uncomment below to setup prefix (e.g. Bearer) for API key, if needed +# configuration.api_key_prefix['Bearer'] = 'Bearer' + +# Enter a context with an instance of the API client +with vulncheck_sdk.ApiClient(configuration) as api_client: + # Create an instance of the API class + api_instance = vulncheck_sdk.IndicesApi(api_client) + page = 56 # int | set the page number of the response (optional) + limit = 56 # int | limit the number of findings in the response (optional) + cursor = 'cursor_example' # str | continue server-side paging using a cursor id (optional) + start_cursor = 'start_cursor_example' # str | request server-side paging (optional) + order = 'order_example' # str | direction of the sort (optional) + sort = 'sort_example' # str | field by which to sort the results (optional) + cve = 'cve_example' # str | Specify a CVE ID to search with. (optional) + alias = 'alias_example' # str | Specify a vulnerability alias to search with. (optional) + iava = 'iava_example' # str | Specify an IAVA ID to search with. (optional) + jvndb = 'jvndb_example' # str | Specify a JVNDB ID to search with. (optional) + ilvn = 'ilvn_example' # str | Specify an ILVN ID to search with. (optional) + threat_actor = 'threat_actor_example' # str | Specify a threat actor name to search with. (optional) + mitre_id = 'mitre_id_example' # str | Specify a MITRE ID to search with. (optional) + misp_id = 'misp_id_example' # str | Specify a MISP ID to search with. (optional) + ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) + botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) + published = 'published_example' # str | Specify a published date (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) + updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) + updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) + last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) + last_mod_end_date = 'last_mod_end_date_example' # str | Specify an ending last modified date to filter with. (optional) + pub_start_date = 'pub_start_date_example' # str | Specify a starting published date to filter with. (optional) + pub_end_date = 'pub_end_date_example' # str | Specify an ending published date to filter with. (optional) + + try: + # Return vulnerability data stored in index \"hpe-eol\" + api_response = api_instance.index_hpe_eol_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + print("The response of IndicesApi->index_hpe_eol_get:\n") + pprint(api_response) + except Exception as e: + print("Exception when calling IndicesApi->index_hpe_eol_get: %s\n" % e) +``` + + + +### Parameters + + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **page** | **int**| set the page number of the response | [optional] + **limit** | **int**| limit the number of findings in the response | [optional] + **cursor** | **str**| continue server-side paging using a cursor id | [optional] + **start_cursor** | **str**| request server-side paging | [optional] + **order** | **str**| direction of the sort | [optional] + **sort** | **str**| field by which to sort the results | [optional] + **cve** | **str**| Specify a CVE ID to search with. | [optional] + **alias** | **str**| Specify a vulnerability alias to search with. | [optional] + **iava** | **str**| Specify an IAVA ID to search with. | [optional] + **jvndb** | **str**| Specify a JVNDB ID to search with. | [optional] + **ilvn** | **str**| Specify an ILVN ID to search with. | [optional] + **threat_actor** | **str**| Specify a threat actor name to search with. | [optional] + **mitre_id** | **str**| Specify a MITRE ID to search with. | [optional] + **misp_id** | **str**| Specify a MISP ID to search with. | [optional] + **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] + **botnet** | **str**| Specify a botnet name to search with. | [optional] + **published** | **str**| Specify a published date | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] + **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] + **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] + **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] + **last_mod_end_date** | **str**| Specify an ending last modified date to filter with. | [optional] + **pub_start_date** | **str**| Specify a starting published date to filter with. | [optional] + **pub_end_date** | **str**| Specify an ending published date to filter with. | [optional] + +### Return type + +[**RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination**](RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination.md) + +### Authorization + +[Bearer](../README.md#Bearer) + +### HTTP request headers + + - **Content-Type**: Not defined + - **Accept**: application/json + +### HTTP response details + +| Status code | Description | Response headers | +|-------------|-------------|------------------| +**200** | OK | - | +**404** | Not Found | - | +**500** | Internal Server Error | - | + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + # **index_hpe_get** > RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination index_hpe_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) @@ -62913,7 +63191,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_vulncheck_canaries10d_get** -> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination index_vulncheck_canaries10d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, src_ip=src_ip, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination index_vulncheck_canaries10d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, src_ip=src_ip, src_asn=src_asn, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"vulncheck-canaries-10d\" @@ -62972,6 +63250,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: src_country = 'src_country_example' # str | Country code in ISO-3166 format (optional) dst_country = 'dst_country_example' # str | Country code in ISO-3166 format (optional) src_ip = 'src_ip_example' # str | Source IP address (optional) + src_asn = 'src_asn_example' # str | Source ASN in format AS12345 (optional) var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) @@ -62982,7 +63261,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"vulncheck-canaries-10d\" - api_response = api_instance.index_vulncheck_canaries10d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, src_ip=src_ip, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_vulncheck_canaries10d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, src_ip=src_ip, src_asn=src_asn, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_vulncheck_canaries10d_get:\n") pprint(api_response) except Exception as e: @@ -63007,6 +63286,7 @@ Name | Type | Description | Notes **src_country** | **str**| Country code in ISO-3166 format | [optional] **dst_country** | **str**| Country code in ISO-3166 format | [optional] **src_ip** | **str**| Source IP address | [optional] + **src_asn** | **str**| Source ASN in format AS12345 | [optional] **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] @@ -63039,7 +63319,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_vulncheck_canaries30d_get** -> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination index_vulncheck_canaries30d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, src_ip=src_ip, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination index_vulncheck_canaries30d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, src_ip=src_ip, src_asn=src_asn, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"vulncheck-canaries-30d\" @@ -63098,6 +63378,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: src_country = 'src_country_example' # str | Country code in ISO-3166 format (optional) dst_country = 'dst_country_example' # str | Country code in ISO-3166 format (optional) src_ip = 'src_ip_example' # str | Source IP address (optional) + src_asn = 'src_asn_example' # str | Source ASN in format AS12345 (optional) var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) @@ -63108,7 +63389,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"vulncheck-canaries-30d\" - api_response = api_instance.index_vulncheck_canaries30d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, src_ip=src_ip, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_vulncheck_canaries30d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, src_ip=src_ip, src_asn=src_asn, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_vulncheck_canaries30d_get:\n") pprint(api_response) except Exception as e: @@ -63133,6 +63414,7 @@ Name | Type | Description | Notes **src_country** | **str**| Country code in ISO-3166 format | [optional] **dst_country** | **str**| Country code in ISO-3166 format | [optional] **src_ip** | **str**| Source IP address | [optional] + **src_asn** | **str**| Source ASN in format AS12345 | [optional] **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] @@ -63165,7 +63447,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_vulncheck_canaries3d_get** -> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination index_vulncheck_canaries3d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, src_ip=src_ip, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination index_vulncheck_canaries3d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, src_ip=src_ip, src_asn=src_asn, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"vulncheck-canaries-3d\" @@ -63224,6 +63506,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: src_country = 'src_country_example' # str | Country code in ISO-3166 format (optional) dst_country = 'dst_country_example' # str | Country code in ISO-3166 format (optional) src_ip = 'src_ip_example' # str | Source IP address (optional) + src_asn = 'src_asn_example' # str | Source ASN in format AS12345 (optional) var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) @@ -63234,7 +63517,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"vulncheck-canaries-3d\" - api_response = api_instance.index_vulncheck_canaries3d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, src_ip=src_ip, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_vulncheck_canaries3d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, src_ip=src_ip, src_asn=src_asn, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_vulncheck_canaries3d_get:\n") pprint(api_response) except Exception as e: @@ -63259,6 +63542,7 @@ Name | Type | Description | Notes **src_country** | **str**| Country code in ISO-3166 format | [optional] **dst_country** | **str**| Country code in ISO-3166 format | [optional] **src_ip** | **str**| Source IP address | [optional] + **src_asn** | **str**| Source ASN in format AS12345 | [optional] **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] @@ -63291,7 +63575,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_vulncheck_canaries90d_get** -> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination index_vulncheck_canaries90d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, src_ip=src_ip, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination index_vulncheck_canaries90d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, src_ip=src_ip, src_asn=src_asn, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"vulncheck-canaries-90d\" @@ -63350,6 +63634,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: src_country = 'src_country_example' # str | Country code in ISO-3166 format (optional) dst_country = 'dst_country_example' # str | Country code in ISO-3166 format (optional) src_ip = 'src_ip_example' # str | Source IP address (optional) + src_asn = 'src_asn_example' # str | Source ASN in format AS12345 (optional) var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) @@ -63360,7 +63645,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"vulncheck-canaries-90d\" - api_response = api_instance.index_vulncheck_canaries90d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, src_ip=src_ip, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_vulncheck_canaries90d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, src_ip=src_ip, src_asn=src_asn, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_vulncheck_canaries90d_get:\n") pprint(api_response) except Exception as e: @@ -63385,6 +63670,7 @@ Name | Type | Description | Notes **src_country** | **str**| Country code in ISO-3166 format | [optional] **dst_country** | **str**| Country code in ISO-3166 format | [optional] **src_ip** | **str**| Source IP address | [optional] + **src_asn** | **str**| Source ASN in format AS12345 | [optional] **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] @@ -63417,7 +63703,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_vulncheck_canaries_get** -> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination index_vulncheck_canaries_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, src_ip=src_ip, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination index_vulncheck_canaries_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, src_ip=src_ip, src_asn=src_asn, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"vulncheck-canaries\" @@ -63476,6 +63762,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: src_country = 'src_country_example' # str | Country code in ISO-3166 format (optional) dst_country = 'dst_country_example' # str | Country code in ISO-3166 format (optional) src_ip = 'src_ip_example' # str | Source IP address (optional) + src_asn = 'src_asn_example' # str | Source ASN in format AS12345 (optional) var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) @@ -63486,7 +63773,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"vulncheck-canaries\" - api_response = api_instance.index_vulncheck_canaries_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, src_ip=src_ip, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_vulncheck_canaries_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, src_ip=src_ip, src_asn=src_asn, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_vulncheck_canaries_get:\n") pprint(api_response) except Exception as e: @@ -63511,6 +63798,7 @@ Name | Type | Description | Notes **src_country** | **str**| Country code in ISO-3166 format | [optional] **dst_country** | **str**| Country code in ISO-3166 format | [optional] **src_ip** | **str**| Source IP address | [optional] + **src_asn** | **str**| Source ASN in format AS12345 | [optional] **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] diff --git a/openapi.json b/openapi.json index 34e0a1e0..d5d6c0ef 100644 --- a/openapi.json +++ b/openapi.json @@ -1 +1 @@ -{"components":{"schemas":{"advisory.A10":{"description":"advisory.A10","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"reference":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ABBAdvisory":{"description":"advisory.ABBAdvisory","properties":{"abb_vulnerability_id":{"items":{"type":"string"},"type":"array","uniqueItems":false},"csaf":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"document_id":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ADP":{"description":"advisory.ADP","properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.MAffected"},"type":"array","uniqueItems":false},"metrics":{"items":{"$ref":"#/components/schemas/advisory.VulnrichmentMetric"},"type":"array","uniqueItems":false},"providerMetadata":{"$ref":"#/components/schemas/advisory.MProviderMetadata"}},"type":"object"},"advisory.ADPContainer":{"description":"advisory.ADPContainer","properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.MAffected"},"type":"array","uniqueItems":false},"datePublic":{"description":"OK","type":"string"},"descriptions":{"description":"OK","items":{"$ref":"#/components/schemas/advisory.MDescriptions"},"type":"array","uniqueItems":false},"impacts":{"description":"OK","items":{"$ref":"#/components/schemas/advisory.Impact"},"type":"array","uniqueItems":false},"metrics":{"description":"OK","items":{"$ref":"#/components/schemas/advisory.Metric"},"type":"array","uniqueItems":false},"problemTypes":{"description":"OK","items":{"$ref":"#/components/schemas/advisory.MProblemTypes"},"type":"array","uniqueItems":false},"providerMetadata":{"$ref":"#/components/schemas/advisory.MProviderMetadata"},"references":{"items":{"$ref":"#/components/schemas/advisory.MReference"},"type":"array","uniqueItems":false},"tags":{"description":"OK","items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"description":"OK","type":"string"}},"type":"object"},"advisory.AIX":{"description":"advisory.AIX","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AMD":{"description":"advisory.AMD","properties":{"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_updated":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AMI":{"description":"advisory.AMI","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ASRG":{"description":"advisory.ASRG","properties":{"affected_products":{"type":"string"},"capec":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"problem_type":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AVEVAAdvisory":{"description":"advisory.AVEVAAdvisory","properties":{"aveva_vulnerability_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"published_by":{"type":"string"},"rating":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AVIDMLAdvs":{"description":"advisory.AVIDMLAdvs","properties":{"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AWS":{"description":"advisory.AWS","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Abbott":{"description":"advisory.Abbott","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Absolute":{"description":"advisory.Absolute","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Acknowledgement":{"description":"advisory.Acknowledgement","properties":{"name":{"items":{"$ref":"#/components/schemas/advisory.IVal"},"type":"array","uniqueItems":false},"url":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.Acronis":{"description":"advisory.Acronis","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AdobeAdvisory":{"description":"advisory.AdobeAdvisory","properties":{"adobe_cves":{"items":{"$ref":"#/components/schemas/advisory.AdobeCVE"},"type":"array","uniqueItems":false},"affected":{"items":{"$ref":"#/components/schemas/advisory.AdobeAffected"},"type":"array"},"bulletinId":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"link":{"type":"string"},"solutions":{"items":{"$ref":"#/components/schemas/advisory.AdobeSolution"},"type":"array"},"updated_at":{"type":"string"}},"type":"object"},"advisory.AdobeAffected":{"description":"advisory.AdobeAffected","properties":{"platform":{"type":"string"},"product":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.AdobeCVE":{"description":"advisory.AdobeCVE","properties":{"cve":{"type":"string"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"}},"type":"object"},"advisory.AdobeSolution":{"description":"advisory.AdobeSolution","properties":{"platform":{"type":"string"},"product":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Advantech":{"description":"advisory.Advantech","properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Advisory":{"description":"advisory.Advisory","properties":{"affects":{"type":"string"},"announced":{"type":"string"},"category":{"type":"string"},"corrections":{"items":{"$ref":"#/components/schemas/advisory.Correction"},"type":"array"},"credits":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"module":{"type":"string"},"name":{"type":"string"},"topic":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AdvisoryDetails":{"description":"advisory.AdvisoryDetails","properties":{"bugzilla":{"$ref":"#/components/schemas/advisory.Bugzilla"},"cve":{"$ref":"#/components/schemas/advisory.OvalCVE"},"issued":{"$ref":"#/components/schemas/advisory.Issued"},"severity":{"type":"string"},"updated":{"$ref":"#/components/schemas/advisory.Updated"}},"type":"object"},"advisory.AdvisoryRecord":{"description":"advisory.AdvisoryRecord","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"external_id":{"items":{"type":"string"},"type":"array","uniqueItems":false},"lang":{"type":"string"},"name":{"type":"string"},"refsource":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.Affected":{"description":"advisory.Affected","properties":{"database_specific":{"description":"The meaning of the values within the object is entirely defined by the database"},"ecosystem_specific":{"description":"The meaning of the values within the object is entirely defined by the ecosystem"},"package":{"$ref":"#/components/schemas/advisory.OSVPackage"},"ranges":{"items":{"$ref":"#/components/schemas/advisory.Range"},"type":"array","uniqueItems":false},"severity":{"items":{"$ref":"#/components/schemas/advisory.Severity"},"type":"array","uniqueItems":false},"versions":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.AffectedChrome":{"description":"advisory.AffectedChrome","properties":{"fixed_version":{"type":"string"},"product":{"type":"string"}},"type":"object"},"advisory.AffectedDebianPackage":{"description":"advisory.AffectedDebianPackage","properties":{"name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.AffectedDebianRelease":{"description":"advisory.AffectedDebianRelease","properties":{"fixed_version":{"type":"string"},"nodsa":{"type":"string"},"nodsa_reason":{"type":"string"},"release_name":{"type":"string"},"repositories":{"items":{"$ref":"#/components/schemas/advisory.AffectedDebianRepository"},"type":"array","uniqueItems":false},"status":{"type":"string"},"urgency":{"type":"string"}},"type":"object"},"advisory.AffectedDebianRepository":{"description":"advisory.AffectedDebianRepository","properties":{"repository_name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.AffectedFile":{"description":"advisory.AffectedFile","properties":{"file_last_modified":{"type":"string"},"file_name":{"type":"string"}},"type":"object"},"advisory.AffectedProduct":{"description":"advisory.AffectedProduct","properties":{"affectedReleases":{"type":"string"},"fixedReleases":{"type":"string"},"lexmarkModels":{"type":"string"}},"type":"object"},"advisory.AffectedRel":{"description":"advisory.AffectedRel","properties":{"advisory":{"type":"string"},"cpe":{"type":"string"},"package":{"type":"string"},"product_name":{"type":"string"},"release_date":{"type":"string"}},"type":"object"},"advisory.AffectedUbuntuPackage":{"description":"advisory.AffectedUbuntuPackage","properties":{"break_commit_url":{"items":{"type":"string"},"type":"array","uniqueItems":false},"fix_commit_url":{"items":{"type":"string"},"type":"array","uniqueItems":false},"package_name":{"type":"string"},"package_release_status":{"items":{"$ref":"#/components/schemas/advisory.UbuntuPackageReleaseStatus"},"type":"array","uniqueItems":false},"upstream_fix_url":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.AlephResearch":{"description":"advisory.AlephResearch","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Alibaba":{"description":"advisory.Alibaba","properties":{"cnnvd":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cnvd":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"mitigation_cn":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary_cn":{"type":"string"},"title_cn":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AlmaDate":{"description":"advisory.AlmaDate","properties":{"$date":{"type":"integer"}},"type":"object"},"advisory.AlmaLinuxUpdate":{"description":"advisory.AlmaLinuxUpdate","properties":{"bs_repo_id":{"$ref":"#/components/schemas/advisory.AlmaObjectID"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"fromstr":{"type":"string"},"id":{"$ref":"#/components/schemas/advisory.AlmaObjectID"},"issued_date":{"$ref":"#/components/schemas/advisory.AlmaDate"},"pkglist":{"$ref":"#/components/schemas/advisory.AlmaPackageList"},"pushcount":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.AlmaReference"},"type":"array","uniqueItems":false},"release":{"type":"string"},"rights":{"type":"string"},"severity":{"type":"string"},"solution":{"type":"string"},"status":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"},"update_url":{"type":"string"},"updated_date":{"$ref":"#/components/schemas/advisory.AlmaDate"},"updateinfo_id":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.AlmaObjectID":{"description":"advisory.AlmaObjectID","properties":{"$oid":{"type":"string"}},"type":"object"},"advisory.AlmaPackage":{"description":"advisory.AlmaPackage","properties":{"arch":{"type":"string"},"epoch":{"type":"string"},"filename":{"type":"string"},"name":{"type":"string"},"reboot_suggested":{"type":"integer"},"release":{"type":"string"},"source":{"type":"string"},"sum":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.AlmaPackageList":{"description":"advisory.AlmaPackageList","properties":{"name":{"type":"string"},"packages":{"items":{"$ref":"#/components/schemas/advisory.AlmaPackage"},"type":"array","uniqueItems":false},"shortname":{"type":"string"}},"type":"object"},"advisory.AlmaReference":{"description":"advisory.AlmaReference","properties":{"href":{"type":"string"},"id":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.AlpineLinuxSecDB":{"description":"advisory.AlpineLinuxSecDB","properties":{"apkurl":{"type":"string"},"archs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"distroversion":{"type":"string"},"packages":{"items":{"$ref":"#/components/schemas/advisory.AlpineLinuxSecDBPackage"},"type":"array","uniqueItems":false},"reponame":{"type":"string"},"urlprefix":{"type":"string"}},"type":"object"},"advisory.AlpineLinuxSecDBPackage":{"description":"advisory.AlpineLinuxSecDBPackage","properties":{"package_name":{"type":"string"},"secfixes":{"items":{"$ref":"#/components/schemas/advisory.AlpineLinuxSecurityFix"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.AlpineLinuxSecurityFix":{"description":"advisory.AlpineLinuxSecurityFix","properties":{"cve":{"type":"string"},"fixed_version":{"type":"string"}},"type":"object"},"advisory.AmazonAffectedPackage":{"description":"advisory.AmazonAffectedPackage","properties":{"advisory":{"type":"string"},"package":{"type":"string"},"platform":{"type":"string"},"releaseDate":{"type":"string"},"status":{"type":"string"}},"type":"object"},"advisory.AmazonCVE":{"description":"advisory.AmazonCVE","properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.AmazonAffectedPackage"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AnchoreNVDOverride":{"description":"advisory.AnchoreNVDOverride","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"override":{"$ref":"#/components/schemas/advisory.Override"},"url":{"type":"string"}},"type":"object"},"advisory.AndroidAdvisory":{"description":"advisory.AndroidAdvisory","properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.AndroidAffected"},"type":"array","uniqueItems":false},"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.AndroidReference"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AndroidAffected":{"description":"advisory.AndroidAffected","properties":{"ecosystem_specific":{"$ref":"#/components/schemas/advisory.EcoSystem"},"package":{"$ref":"#/components/schemas/advisory.AndroidPackage"},"ranges":{"items":{"$ref":"#/components/schemas/advisory.AndroidRange"},"type":"array","uniqueItems":false},"versions":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.AndroidEvent":{"description":"advisory.AndroidEvent","properties":{"fixed":{"type":"string"},"introduced":{"type":"string"}},"type":"object"},"advisory.AndroidPackage":{"description":"advisory.AndroidPackage","properties":{"ecosystem":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.AndroidRange":{"description":"advisory.AndroidRange","properties":{"events":{"items":{"$ref":"#/components/schemas/advisory.AndroidEvent"},"type":"array","uniqueItems":false},"type":{"type":"string"}},"type":"object"},"advisory.AndroidReference":{"description":"advisory.AndroidReference","properties":{"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheActiveMQ":{"description":"advisory.ApacheActiveMQ","properties":{"affected_versions":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheArchiva":{"description":"advisory.ApacheArchiva","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheArrow":{"description":"advisory.ApacheArrow","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheCamel":{"description":"advisory.ApacheCamel","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheCommons":{"description":"advisory.ApacheCommons","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheCouchDB":{"description":"advisory.ApacheCouchDB","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheFlink":{"description":"advisory.ApacheFlink","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.ApacheGuacamole":{"description":"advisory.ApacheGuacamole","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheHTTP":{"description":"advisory.ApacheHTTP","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheHadoop":{"description":"advisory.ApacheHadoop","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheJSPWiki":{"description":"advisory.ApacheJSPWiki","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheKafka":{"description":"advisory.ApacheKafka","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheLoggingServices":{"description":"advisory.ApacheLoggingServices","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheNiFi":{"description":"advisory.ApacheNiFi","properties":{"affected_version":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed_versions":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheOFBiz":{"description":"advisory.ApacheOFBiz","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.ApacheOpenMeetings":{"description":"advisory.ApacheOpenMeetings","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheOpenOffice":{"description":"advisory.ApacheOpenOffice","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApachePulsar":{"description":"advisory.ApachePulsar","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheShiro":{"description":"advisory.ApacheShiro","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheSpark":{"description":"advisory.ApacheSpark","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheStruts":{"description":"advisory.ApacheStruts","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"impact":{"type":"string"},"rating":{"type":"string"},"remediation":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vulnerable_version":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.ApacheSubversion":{"description":"advisory.ApacheSubversion","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheSuperset":{"description":"advisory.ApacheSuperset","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheTomcat":{"description":"advisory.ApacheTomcat","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheZooKeeper":{"description":"advisory.ApacheZooKeeper","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AppCheck":{"description":"advisory.AppCheck","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Appgate":{"description":"advisory.Appgate","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AppleAdvisory":{"description":"advisory.AppleAdvisory","properties":{"components":{"items":{"$ref":"#/components/schemas/advisory.AppleComponent"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"name":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AppleComponent":{"description":"advisory.AppleComponent","properties":{"available_for":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"description":{"type":"string"},"impact":{"type":"string"},"itw_exploit":{"type":"boolean"},"name":{"type":"string"}},"type":"object"},"advisory.ArchIssue":{"description":"advisory.ArchIssue","properties":{"advisories":{"items":{"type":"string"},"type":"array"},"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"issues":{"description":"cves","items":{"type":"string"},"type":"array"},"name":{"type":"string"},"packages":{"items":{"type":"string"},"type":"array"},"references":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"status":{"type":"string"},"ticket":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.Arista":{"description":"advisory.Arista","properties":{"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Aruba":{"description":"advisory.Aruba","properties":{"csaf":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AssetNote":{"description":"advisory.AssetNote","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Asterisk":{"description":"advisory.Asterisk","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Astra":{"description":"advisory.Astra","properties":{"bdu":{"items":{"type":"string"},"type":"array","uniqueItems":false},"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary_ru":{"type":"string"},"title_ru":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Asus":{"description":"advisory.Asus","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"type":"string"},"id":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.AtlassianAdvisory":{"description":"advisory.AtlassianAdvisory","properties":{"affected_version":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"detailed_summary":{"description":"overloading in places with 'RiskAssessment' and other places with\n'Description'","type":"string"},"fixed_version":{"type":"string"},"link":{"type":"string"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"release_date":{"type":"string"},"severity":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.AtlassianProducts":{"description":"advisory.AtlassianProducts","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"name":{"type":"string"}},"type":"object"},"advisory.AtlassianVuln":{"description":"advisory.AtlassianVuln","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"products":{"items":{"$ref":"#/components/schemas/advisory.AtlassianProducts"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Atredis":{"description":"advisory.Atredis","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vendors":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.Audiocodes":{"description":"advisory.Audiocodes","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AusCert":{"description":"advisory.AusCert","properties":{"body":{"type":"string"},"bulletinId":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"link":{"type":"string"},"operatingSystem":{"type":"string"},"product":{"type":"string"},"publisher":{"type":"string"},"resolution":{"type":"string"}},"type":"object"},"advisory.Autodesk":{"description":"advisory.Autodesk","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Avaya":{"description":"advisory.Avaya","properties":{"advisory_number":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"last_revised":{"type":"string"},"overview":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Avigilon":{"description":"advisory.Avigilon","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Award":{"description":"advisory.Award","properties":{"amount":{"type":"string"},"currency":{"type":"string"}},"type":"object"},"advisory.Axis":{"description":"advisory.Axis","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Azul":{"description":"advisory.Azul","properties":{"base_score":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"prime_version":{"items":{"$ref":"#/components/schemas/advisory.PrimeVersion"},"type":"array","uniqueItems":false},"release":{"type":"string"},"url":{"type":"string"},"zulu_version":{"items":{"$ref":"#/components/schemas/advisory.ZuluVersion"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.BBraunAdvisory":{"description":"advisory.BBraunAdvisory","properties":{"attention":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"equipment":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"},"vulnerabilities":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.BDUAdvisory":{"description":"advisory.BDUAdvisory","properties":{"bdu_id":{"description":"BDU:2022-03833","type":"string"},"cve":{"description":"[]string{\"CVE-2022-28194\"}","items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"$ref":"#/components/schemas/advisory.BDUCvss"},"cvss3":{"$ref":"#/components/schemas/advisory.BDUCvss3"},"cwe":{"description":"CWE-119","type":"string"},"date_added":{"type":"string"},"description_ru":{"description":"Библиотека libxml2 до версии 2.9.12 не корректно обрабатывает XML-документы, содержащие определенные сущности. В результате могут быть выполнены произвольные команды.","type":"string"},"environment":{"$ref":"#/components/schemas/advisory.BDUEnvironment"},"exploit_status_en":{"description":"Exploited","type":"string"},"exploit_status_ru":{"description":"Exploited","type":"string"},"fix_status_en":{"description":"Fixed","type":"string"},"fix_status_ru":{"description":"Fixed","type":"string"},"identify_date":{"description":"2022-09-01","type":"string"},"name_ru":{"description":"BDU:2022-03833: Уязвимость модуля Cboot (tegrabl_cbo.c) пакета драйверов микропрограммного обеспечения вычислительных плат NVIDIA Jetson, позволяющая нарушителю выполнить произвольный код или вызвать частичный отказ в обслуживании","type":"string"},"severity_ru":{"description":"High","type":"string"},"solution_ru":{"description":"Обновите драйверы микропрограммного обеспечения вычислительных плат NVIDIA Jetson до версии 32.6.1 или более поздней","type":"string"},"sources":{"description":"https://nvd.nist.gov/vuln/detail/CVE-2022-28194","items":{"type":"string"},"type":"array","uniqueItems":false},"text_ru":{"description":"Библиотека libxml2 до версии 2.9.12 не корректно обрабатывает XML-документы, содержащие определенные сущности. В результате могут быть выполнены произвольные команды.","type":"string"},"url":{"description":"https://bdu.fstec.ru/vul/2022-03833","type":"string"},"vul_status_en":{"description":"Exploitable","type":"string"},"vul_status_ru":{"description":"Exploitable","type":"string"},"vulnerable_software":{"$ref":"#/components/schemas/advisory.BDUVulnerableSoftware"}},"type":"object"},"advisory.BDUCvss":{"description":"advisory.BDUCvss","properties":{"vector":{"$ref":"#/components/schemas/advisory.BDUVector"}},"type":"object"},"advisory.BDUCvss3":{"description":"advisory.BDUCvss3","properties":{"vector":{"$ref":"#/components/schemas/advisory.BDUVector"}},"type":"object"},"advisory.BDUEnvironment":{"description":"advisory.BDUEnvironment","properties":{"os":{"$ref":"#/components/schemas/advisory.BDUOs"}},"type":"object"},"advisory.BDUOs":{"description":"advisory.BDUOs","properties":{"name":{"type":"string"},"platform":{"type":"string"},"text":{"type":"string"},"vendor":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.BDUSoft":{"description":"advisory.BDUSoft","properties":{"name":{"type":"string"},"platform":{"type":"string"},"text":{"type":"string"},"types":{"$ref":"#/components/schemas/advisory.BDUTypes"},"vendor":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.BDUTypes":{"description":"advisory.BDUTypes","properties":{"text":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.BDUVector":{"description":"advisory.BDUVector","properties":{"score":{"type":"string"},"text":{"type":"string"}},"type":"object"},"advisory.BDUVulnerableSoftware":{"description":"advisory.BDUVulnerableSoftware","properties":{"soft":{"$ref":"#/components/schemas/advisory.BDUSoft"}},"type":"object"},"advisory.BLS":{"description":"advisory.BLS","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"prodcut":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.Bandr":{"description":"advisory.Bandr","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"document_id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BaxterAdvisory":{"description":"advisory.BaxterAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_updated":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BeckhoffAdvisory":{"description":"advisory.BeckhoffAdvisory","properties":{"beckhoff_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_revised":{"description":"if in the future we can delete this great - it's just a dupe to\nnormalize the field names","type":"string"},"name":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vde":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.BeckmanCoulter":{"description":"advisory.BeckmanCoulter","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BectonDickinsonAdvisory":{"description":"advisory.BectonDickinsonAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"products_affected":{"items":{"$ref":"#/components/schemas/advisory.ProductsAffected"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BeldenAdvisory":{"description":"advisory.BeldenAdvisory","properties":{"belden_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_updated":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.BeyondTrust":{"description":"advisory.BeyondTrust","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Binarly":{"description":"advisory.Binarly","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BitDefender":{"description":"advisory.BitDefender","properties":{"additional_details":{"type":"string"},"affected_products":{"type":"string"},"affected_vendors":{"type":"string"},"credit":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"details":{"type":"string"},"timeline":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BlackBerry":{"description":"advisory.BlackBerry","properties":{"bsrt":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BoschAdvisory":{"description":"advisory.BoschAdvisory","properties":{"bosch_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BostonScientificAdvisory":{"description":"advisory.BostonScientificAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Botnet":{"description":"advisory.Botnet","properties":{"associated_capecs":{"items":{"$ref":"#/components/schemas/advisory.Capec"},"type":"array","uniqueItems":false},"associated_cwes":{"items":{"$ref":"#/components/schemas/advisory.CweData"},"type":"array","uniqueItems":false},"associated_mitre_attack_techniques":{"items":{"$ref":"#/components/schemas/advisory.MitreAttackTechWithRefs"},"type":"array","uniqueItems":false},"botnet_name":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve_references":{"items":{"$ref":"#/components/schemas/advisory.CVEReference"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"malpedia_url":{"type":"string"},"tools":{"items":{"$ref":"#/components/schemas/advisory.Tool"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.Bugzilla":{"description":"advisory.Bugzilla","properties":{"href":{"type":"string"},"id":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.CACyberCentreAdvisory":{"description":"advisory.CACyberCentreAdvisory","properties":{"control_systems":{"type":"boolean"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"html_url":{"type":"string"},"serial_number":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.CBLMariner":{"description":"advisory.CBLMariner","properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"package":{"type":"string"},"severity":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.CERTEUAdvisory":{"description":"advisory.CERTEUAdvisory","properties":{"advisoryId":{"type":"string"},"affectedProducts":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"history":{"items":{"type":"string"},"type":"array"},"link":{"type":"string"},"recommendations":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"technicalDetails":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.CESA":{"description":"advisory.CESA","properties":{"arch":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"issueDate":{"type":"string"},"osRelease":{"type":"string"},"packages":{"items":{"$ref":"#/components/schemas/advisory.CentosPackage"},"type":"array"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"}},"type":"object"},"advisory.CISAAlert":{"description":"advisory.CISAAlert","properties":{"AffectedProducts":{"type":"string"},"AlertID":{"type":"string"},"Archived":{"type":"boolean"},"CVEExploitedITW":{"type":"boolean"},"CVSS":{"type":"string"},"ICSMA":{"type":"boolean"},"Mitigations":{"type":"string"},"ReleaseDate":{"type":"string"},"Title":{"type":"string"},"Url":{"type":"string"},"Vendor":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.CISControl":{"description":"advisory.CISControl","properties":{"cis_control_description":{"type":"string"},"cis_control_id":{"type":"string"},"cis_control_name":{"type":"string"}},"type":"object"},"advisory.CNNVDEntryJSON":{"description":"advisory.CNNVDEntryJSON","properties":{"bugtraq-id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"modified-date":{"type":"string"},"name_cn":{"type":"string"},"published-date":{"type":"string"},"severity_cn":{"type":"string"},"severity_en":{"type":"string"},"source":{"type":"string"},"url":{"type":"string"},"vuln-description_cn":{"type":"string"},"vuln-solution":{"type":"string"},"vuln-type_cn":{"type":"string"},"vuln-type_en":{"type":"string"}},"type":"object"},"advisory.CNVDBulletin":{"description":"advisory.CNVDBulletin","properties":{"cnta":{"type":"string"},"cnvd":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"reference_urls":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CNVDFlaw":{"description":"advisory.CNVDFlaw","properties":{"affected_products_cn":{"type":"string"},"bugtraq_id":{"type":"string"},"cnvd":{"type":"string"},"collection_time":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"harm_level":{"type":"string"},"id":{"type":"string"},"public_date":{"type":"string"},"reference_urls":{"items":{"type":"string"},"type":"array","uniqueItems":false},"submission_time":{"type":"string"},"title_cn":{"type":"string"},"update_time":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"validation_info_cn":{"type":"string"},"validation_info_en":{"type":"string"},"vendor_patch_cn":{"type":"string"},"vuln_attachments":{"items":{"type":"string"},"type":"array","uniqueItems":false},"vuln_description_cn":{"type":"string"},"vuln_solution_cn":{"type":"string"},"vuln_type_cn":{"type":"string"}},"type":"object"},"advisory.COSUpdate":{"description":"advisory.COSUpdate","properties":{"changed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"featured":{"items":{"type":"string"},"type":"array","uniqueItems":false},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"id":{"type":"string"},"reference":{"type":"string"},"security":{"items":{"type":"string"},"type":"array","uniqueItems":false},"updated":{"type":"string"}},"type":"object"},"advisory.CPEMatch":{"description":"advisory.CPEMatch","properties":{"criteria":{"type":"string"},"matchCriteriaId":{"type":"string"},"vulnerable":{"type":"boolean"}},"type":"object"},"advisory.CPENode":{"description":"advisory.CPENode","properties":{"cpeMatch":{"items":{"$ref":"#/components/schemas/advisory.CPEMatch"},"type":"array","uniqueItems":false},"negate":{"type":"boolean"},"operator":{"type":"string"}},"type":"object"},"advisory.CSAF":{"description":"advisory.CSAF","properties":{"document":{"$ref":"#/components/schemas/advisory.DocumentMetadata"},"notes":{"description":"Notes holds notes associated with the whole document.\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3217-document-property---notes","items":{"$ref":"#/components/schemas/advisory.CSAFNote"},"type":"array","uniqueItems":false},"product_tree":{"$ref":"#/components/schemas/advisory.ProductBranch"},"vulnerabilities":{"description":"Vulnerabilities contains information about the vulnerabilities,\n(i.e. CVEs), associated threats, and product status.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#323-vulnerabilities-property","items":{"$ref":"#/components/schemas/advisory.CSAFVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CSAFDistribution":{"description":"advisory.CSAFDistribution","type":"object"},"advisory.CSAFNote":{"description":"advisory.CSAFNote","properties":{"audience":{"type":"string"},"category":{"type":"string"},"text":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.CSAFReference":{"description":"advisory.CSAFReference","properties":{"category":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CSAFRelationship":{"description":"advisory.CSAFRelationship","properties":{"category":{"type":"string"},"full_product_name":{"$ref":"#/components/schemas/advisory.Product"},"product_reference":{"type":"string"},"relates_to_product_reference":{"type":"string"}},"type":"object"},"advisory.CSAFScore":{"description":"advisory.CSAFScore","properties":{"cvss_v2":{"$ref":"#/components/schemas/advisory.CVSSV2"},"cvss_v3":{"$ref":"#/components/schemas/advisory.CVSSV3"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CSAFVulnerability":{"description":"advisory.CSAFVulnerability","properties":{"cve":{"description":"MITRE standard Common Vulnerabilities and Exposures (CVE) tracking number for the vulnerability.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3232-vulnerabilities-property---cve","type":"string"},"cwe":{"$ref":"#/components/schemas/advisory.Cwe"},"flags":{"description":"Machine readable flags for products related to vulnerability\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3235-vulnerabilities-property---flags","items":{"$ref":"#/components/schemas/advisory.Flag"},"type":"array","uniqueItems":false},"ids":{"description":"List of IDs represents a list of unique labels or tracking IDs for the vulnerability (if such information exists).\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3236-vulnerabilities-property---ids","items":{"$ref":"#/components/schemas/advisory.TrackingID"},"type":"array","uniqueItems":false},"notes":{"description":"Notes holds notes associated with the Vulnerability object.\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3238-vulnerabilities-property---notes","items":{"$ref":"#/components/schemas/advisory.CSAFNote"},"type":"array","uniqueItems":false},"product_status":{"additionalProperties":{"items":{"type":"string"},"type":"array"},"description":"Provide details on the status of the referenced product related to the vulnerability.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3239-vulnerabilities-property---product-status","type":"object"},"references":{"description":"Vulnerability references holds a list of references associated with this vulnerability item.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#32310-vulnerabilities-property---references","items":{"$ref":"#/components/schemas/advisory.CSAFReference"},"type":"array","uniqueItems":false},"release_date":{"type":"string"},"remediations":{"description":"Provide details of remediations associated with a Vulnerability\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#32312-vulnerabilities-property---remediations","items":{"$ref":"#/components/schemas/advisory.RemediationData"},"type":"array","uniqueItems":false},"scores":{"description":"Scores holds the scores associated with the Vulnerability object.\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#32313-vulnerabilities-property---scores\nCurrently only CVSS v3 is supported.","items":{"$ref":"#/components/schemas/advisory.CSAFScore"},"type":"array","uniqueItems":false},"threats":{"description":"Provide details of threats associated with a vulnerability.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#32314-vulnerabilities-property---threats","items":{"$ref":"#/components/schemas/advisory.ThreatData"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CVEDetail":{"description":"advisory.CVEDetail","properties":{"baseScore":{"type":"string"},"cveid":{"type":"string"},"description":{"type":"string"},"vector":{"type":"string"}},"type":"object"},"advisory.CVEDetailsLink":{"description":"advisory.CVEDetailsLink","properties":{"url":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.CVEReference":{"description":"advisory.CVEReference","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CVSS":{"description":"advisory.CVSS","properties":{"score":{"type":"string"},"severity":{"type":"string"},"type":{"type":"string"},"vector":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.CVSSV2":{"description":"advisory.CVSSV2","properties":{"accessComplexity":{"type":"string"},"accessVector":{"type":"string"},"authentication":{"type":"string"},"availabilityImpact":{"type":"string"},"availabilityRequirement":{"type":"string"},"baseScore":{"type":"number"},"collateralDamagePotential":{"type":"string"},"confidentialityImpact":{"type":"string"},"confidentialityRequirement":{"type":"string"},"environmentalScore":{"type":"number"},"exploitability":{"type":"string"},"integrityImpact":{"type":"string"},"integrityRequirement":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"targetDistribution":{"type":"string"},"temporalScore":{"type":"number"}},"type":"object"},"advisory.CVSSV3":{"description":"advisory.CVSSV3","properties":{"attackComplexity":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"scope":{"type":"string"},"userInteraction":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.CVSSV40":{"description":"this isn't called baseMetric, because it can contain other metrics -- typically supplemental metrics","properties":{"Automatable":{"type":"string"},"Recovery":{"type":"string"},"Safety":{"type":"string"},"attackComplexity":{"type":"string"},"attackRequirements":{"type":"string"},"attackVector":{"type":"string"},"availabilityRequirement":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityRequirement":{"type":"string"},"exploitMaturity":{"type":"string"},"integrityRequirement":{"type":"string"},"modifiedAttackComplexity":{"type":"string"},"modifiedAttackRequirements":{"type":"string"},"modifiedAttackVector":{"type":"string"},"modifiedPrivilegesRequired":{"type":"string"},"modifiedSubAvailabilityImpact":{"type":"string"},"modifiedSubConfidentialityImpact":{"type":"string"},"modifiedSubIntegrityImpact":{"type":"string"},"modifiedUserInteraction":{"type":"string"},"modifiedVulnAvailabilityImpact":{"type":"string"},"modifiedVulnConfidentialityImpact":{"type":"string"},"modifiedVulnIntegrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"providerUrgency":{"type":"string"},"subAvailabilityImpact":{"type":"string"},"subConfidentialityImpact":{"type":"string"},"subIntegrityImpact":{"type":"string"},"userInteraction":{"type":"string"},"valueDensity":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"},"vulnAvailabilityImpact":{"type":"string"},"vulnConfidentialityImpact":{"type":"string"},"vulnIntegrityImpact":{"type":"string"},"vulnerabilityResponseEffort":{"type":"string"}},"type":"object"},"advisory.CVSSV40Threat":{"description":"advisory.CVSSV40Threat","properties":{"baseThreatScore":{"type":"number"},"baseThreatSeverity":{"type":"string"},"exploitMaturity":{"type":"string"}},"type":"object"},"advisory.CWENode":{"description":"advisory.CWENode","type":"object"},"advisory.CanvasExploit":{"description":"advisory.CanvasExploit","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"exploit_pack":{"type":"string"},"name":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Capec":{"description":"advisory.Capec","properties":{"capec_id":{"type":"string"},"capec_name":{"type":"string"},"capec_url":{"type":"string"},"lang":{"type":"string"}},"type":"object"},"advisory.CarestreamAdvisory":{"description":"advisory.CarestreamAdvisory","properties":{"carestream_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_updated":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Carrier":{"description":"advisory.Carrier","properties":{"advisory_id":{"type":"string"},"affected_product":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CentosPackage":{"description":"advisory.CentosPackage","properties":{"filename":{"type":"string"},"name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.CertBE":{"description":"advisory.CertBE","properties":{"affected_software":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"risk":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vulnerability_type":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CertFRAdvisory":{"description":"advisory.CertFRAdvisory","properties":{"affected_systems_fr":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"reference":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"resume_fr":{"type":"string"},"risks_fr":{"type":"string"},"solution_fr":{"type":"string"},"source_fr":{"type":"string"},"title_fr":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CertIN":{"description":"advisory.CertIN","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CertIRSecurityAlert":{"description":"advisory.CertIRSecurityAlert","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary_fa":{"type":"string"},"title_fa":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CertSE":{"description":"advisory.CertSE","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary_sv":{"type":"string"},"title_sv":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CertUA":{"description":"advisory.CertUA","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary_ua":{"type":"string"},"title_ua":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ChainGuard":{"description":"advisory.ChainGuard","properties":{"apkurl":{"type":"string"},"archs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"description":"un-used","type":"string"},"packages":{"items":{"$ref":"#/components/schemas/advisory.ChainGuardPackage"},"type":"array","uniqueItems":false},"reponame":{"type":"string"},"urlprefix":{"type":"string"}},"type":"object"},"advisory.ChainGuardPackage":{"description":"advisory.ChainGuardPackage","properties":{"name":{"type":"string"},"secfixes":{"items":{"$ref":"#/components/schemas/advisory.ChainGuardSecFix"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.ChainGuardSecFix":{"description":"advisory.ChainGuardSecFix","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"version":{"type":"string"}},"type":"object"},"advisory.CheckPoint":{"description":"advisory.CheckPoint","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_updated":{"type":"string"},"reference":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Chrome":{"description":"advisory.Chrome","properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.AffectedChrome"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Ciena":{"description":"advisory.Ciena","properties":{"cves":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"issue_no":{"type":"integer"},"security_advisory_number":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vulnerable_products":{"items":{"$ref":"#/components/schemas/advisory.VulnerableProduct"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CisaCsafAdv":{"description":"advisory.CisaCsafAdv","properties":{"csaf_json":{"$ref":"#/components/schemas/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CiscoAdvisory":{"description":"advisory.CiscoAdvisory","properties":{"ciscoBugId":{"description":"multiple","type":"string"},"csaf":{"type":"string"},"cve":{"description":"multiple","items":{"type":"string"},"type":"array","uniqueItems":false},"cvrf":{"type":"string"},"cwe":{"description":"multiple","type":"string"},"date_added":{"type":"string"},"id":{"type":"integer"},"identifier":{"type":"string"},"name":{"type":"string"},"related_resources":{"type":"string"},"severity":{"type":"string"},"status":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"totalCount":{"type":"integer"},"updated_at":{"type":"string"},"url":{"type":"string"},"version":{"type":"string"},"workarounds":{"type":"string"},"workflowStatus":{"type":"string"}},"type":"object"},"advisory.CiscoCSAF":{"description":"advisory.CiscoCSAF","properties":{"csaf":{},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"identifier":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CiscoKnownGoodValue":{"description":"advisory.CiscoKnownGoodValue","properties":{"biv_category":{"type":"string"},"biv_hash":{"type":"string"},"date_added":{"type":"string"},"dtype":{"type":"string"},"filename":{"type":"string"},"md5":{"type":"string"},"platform":{"type":"string"},"published":{"type":"string"},"sha1":{"type":"string"},"sha256":{"type":"string"},"sha512":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.CitrixAdvisory":{"description":"advisory.CitrixAdvisory","properties":{"citrixId":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"link":{"type":"string"},"products":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.ClarotyVulnerability":{"description":"advisory.ClarotyVulnerability","properties":{"advisory_url":{"type":"string"},"claroty_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_v3":{"type":"number"},"cwe":{"type":"string"},"date_added":{"type":"string"},"product":{"type":"string"},"target":{"type":"string"},"vendor":{"type":"string"},"vendor_advisory_url":{"type":"string"}},"type":"object"},"advisory.CloudBees":{"description":"advisory.CloudBees","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CloudVulnDBAdvisory":{"description":"advisory.CloudVulnDBAdvisory","properties":{"affectedServices":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"}},"type":"object"},"advisory.CodesysAdvisory":{"description":"advisory.CodesysAdvisory","properties":{"codesys_id":{"type":"string"},"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CommVault":{"description":"advisory.CommVault","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve_details":{"items":{"$ref":"#/components/schemas/advisory.CommVaultCVEDetails"},"type":"array","uniqueItems":false},"cvss_range":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"impacted_product":{"$ref":"#/components/schemas/advisory.CommVaultImpactedProduct"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"resolution":{"$ref":"#/components/schemas/advisory.CommVaultResolution"},"severity":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CommVaultCVEDetails":{"description":"advisory.CommVaultCVEDetails","properties":{"cve_id":{"type":"string"},"cvss":{"type":"string"},"description":{"type":"string"},"external_links":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CommVaultImpactedProduct":{"description":"advisory.CommVaultImpactedProduct","properties":{"description":{"type":"string"},"impacted_product_details":{"items":{"$ref":"#/components/schemas/advisory.CommVaultImpactedProductDetails"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CommVaultImpactedProductDetails":{"description":"advisory.CommVaultImpactedProductDetails","properties":{"affected_versions":{"type":"string"},"platforms":{"items":{"type":"string"},"type":"array","uniqueItems":false},"product_name":{"type":"string"},"resolved_versions":{"type":"string"},"status":{"type":"string"}},"type":"object"},"advisory.CommVaultResolution":{"description":"advisory.CommVaultResolution","properties":{"description":{"type":"string"},"resolution_details":{"items":{"$ref":"#/components/schemas/advisory.CommVaultResolutionDetails"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CommVaultResolutionDetails":{"description":"advisory.CommVaultResolutionDetails","properties":{"feature_release":{"type":"string"},"maintenance_release":{"type":"string"}},"type":"object"},"advisory.CompassSecurity":{"description":"advisory.CompassSecurity","properties":{"csnc_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"effect":{"type":"string"},"introduction":{"type":"string"},"product":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"risk":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.ContainerOS":{"description":"advisory.ContainerOS","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updates":{"items":{"$ref":"#/components/schemas/advisory.COSUpdate"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.CoreImpactExploit":{"description":"advisory.CoreImpactExploit","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"exploit_type":{"type":"string"},"platform":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.Correction":{"description":"advisory.Correction","properties":{"correctedAt":{"type":"string"},"orelease":{"type":"string"},"release":{"type":"string"}},"type":"object"},"advisory.Credit":{"description":"advisory.Credit","properties":{"lang":{"type":"string"},"type":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.Crestron":{"description":"advisory.Crestron","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"threat":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.CrowdSec":{"description":"advisory.CrowdSec","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"eitw":{"type":"boolean"},"first_seen":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Curl":{"description":"advisory.Curl","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"info":{"$ref":"#/components/schemas/advisory.OCurl"},"url":{"type":"string"}},"type":"object"},"advisory.CurlAffected":{"description":"advisory.CurlAffected","properties":{"ranges":{"items":{"$ref":"#/components/schemas/advisory.CurlRange"},"type":"array","uniqueItems":false},"versions":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CurlCWE":{"description":"advisory.CurlCWE","properties":{"desc":{"type":"string"},"id":{"type":"string"}},"type":"object"},"advisory.CurlCredit":{"description":"advisory.CurlCredit","properties":{"name":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.CurlRange":{"description":"advisory.CurlRange","properties":{"events":{"items":{"additionalProperties":{"type":"string"},"type":"object"},"type":"array","uniqueItems":false},"repo":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.CustomCPE":{"description":"advisory.CustomCPE","properties":{"mcpeapplicability":{"$ref":"#/components/schemas/advisory.MCPEApplicability"},"stringValue":{"type":"string"}},"type":"object"},"advisory.Cvrf":{"description":"advisory.Cvrf","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CvsssV2_3":{"description":"advisory.CvsssV2_3","properties":{"basescore":{"type":"string"},"temporalscore":{"type":"string"}},"type":"object"},"advisory.Cwe":{"description":"advisory.Cwe","properties":{"id":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.CweAcceptanceLevel":{"description":"advisory.CweAcceptanceLevel","properties":{"description":{"type":"string"},"lastModified":{"type":"string"}},"type":"object"},"advisory.CweData":{"description":"advisory.CweData","properties":{"lang":{"type":"string"},"name":{"type":"string"},"url":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.Cwes":{"description":"advisory.Cwes","properties":{"nodes":{"items":{"$ref":"#/components/schemas/advisory.CWENode"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.Cycle":{"description":"advisory.Cycle","properties":{"codename":{"type":"string"},"cycle":{"type":"string"},"discontinued":{},"eol":{},"extendedSupport":{},"latest":{"type":"string"},"latestReleaseDate":{"type":"string"},"link":{"type":"string"},"lts":{},"releaseDate":{"type":"string"},"releaseLabel":{"type":"string"},"support":{}},"type":"object"},"advisory.DBSpecific":{"description":"advisory.DBSpecific","properties":{"CWE":{"$ref":"#/components/schemas/advisory.CurlCWE"},"award":{"$ref":"#/components/schemas/advisory.Award"},"last_affected":{"type":"string"},"package":{"type":"string"},"severity":{"type":"string"},"url":{"type":"string"},"www":{"type":"string"}},"type":"object"},"advisory.DFNCert":{"description":"advisory.DFNCert","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary_de":{"type":"string"},"title_de":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DLink":{"description":"advisory.DLink","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DNN":{"description":"advisory.DNN","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Dahua":{"description":"advisory.Dahua","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DanFossCVEDetails":{"description":"advisory.DanFossCVEDetails","properties":{"base_score":{"type":"string"},"cve":{"type":"string"},"severity":{"type":"string"}},"type":"object"},"advisory.Danfoss":{"description":"advisory.Danfoss","properties":{"affected_products":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve_details":{"items":{"$ref":"#/components/schemas/advisory.DanFossCVEDetails"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Dassault":{"description":"advisory.Dassault","properties":{"affected_products":{"type":"string"},"affected_versions":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DateTime":{"description":"advisory.DateTime","type":"object"},"advisory.DebianCVE":{"description":"advisory.DebianCVE","properties":{"cve":{"type":"string"},"debianbug":{"type":"integer"},"description":{"type":"string"},"releases":{"items":{"$ref":"#/components/schemas/advisory.AffectedDebianRelease"},"type":"array","uniqueItems":false},"scope":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DebianSecurityAdvisory":{"description":"advisory.DebianSecurityAdvisory","properties":{"affected_packages":{"items":{"$ref":"#/components/schemas/advisory.AffectedDebianPackage"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"dsa":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Dell":{"description":"advisory.Dell","properties":{"articleNumber":{"type":"string"},"combinedProductList":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"dell_cves":{"items":{"$ref":"#/components/schemas/advisory.DellCVE"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DellCVE":{"description":"advisory.DellCVE","properties":{"cve":{"type":"string"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"}},"type":"object"},"advisory.DeltaAdvisory":{"description":"advisory.DeltaAdvisory","properties":{"affectedProducts":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"link":{"type":"string"},"recommendedAction":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.DistroPackage":{"description":"advisory.DistroPackage","properties":{"binary":{"type":"boolean"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"license":{"items":{"type":"string"},"type":"array","uniqueItems":false},"name":{"type":"string"},"secFixes":{"items":{"$ref":"#/components/schemas/advisory.SecFix"},"type":"array"},"versions":{"items":{"$ref":"#/components/schemas/advisory.DistroVersion"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.DistroVersion":{"description":"advisory.DistroVersion","properties":{"arch":{"type":"string"},"published_date":{"type":"string"},"release":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Django":{"description":"advisory.Django","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DocumentMetadata":{"description":"Document contains metadata about the CSAF document itself.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#321-document-property","properties":{"category":{"type":"string"},"csaf_version":{"type":"string"},"distribution":{"$ref":"#/components/schemas/advisory.CSAFDistribution"},"lang":{"type":"string"},"notes":{"description":"used by ncsc","items":{"$ref":"#/components/schemas/advisory.CSAFNote"},"type":"array","uniqueItems":false},"publisher":{"$ref":"#/components/schemas/advisory.Publisher"},"references":{"items":{"$ref":"#/components/schemas/advisory.CSAFReference"},"type":"array","uniqueItems":false},"title":{"description":"Aggregate severity is a vehicle that is provided by the document producer to convey the urgency and\ncriticality with which the one or more vulnerabilities reported should be addressed.","type":"string"},"tracking":{"$ref":"#/components/schemas/advisory.Tracking"}},"type":"object"},"advisory.DocumentPublisher":{"description":"advisory.DocumentPublisher","properties":{"contact_details":{"type":"string"},"issuing_authority":{"type":"string"},"type":{"description":"the json for this is missing/broke","type":"integer"}},"type":"object"},"advisory.DotCMS":{"description":"advisory.DotCMS","properties":{"credit":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"fixed_version":{"type":"string"},"issue_id":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DragosAdvisory":{"description":"advisory.DragosAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"link":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.Draytek":{"description":"advisory.Draytek","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Drupal":{"description":"advisory.Drupal","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"project":{"type":"string"},"risk":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EOLAlibaba":{"description":"advisory.EOLAlibaba","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"eol_date":{"type":"string"},"eol_name":{"type":"string"},"product":{"type":"string"},"release_date":{"type":"string"},"url":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.EOLMicrosoft":{"description":"advisory.EOLMicrosoft","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"edition":{"type":"string"},"extended_end_date":{"type":"string"},"mainstream_date":{"type":"string"},"product":{"type":"string"},"release":{"type":"string"},"release_end_date":{"type":"string"},"release_start_date":{"type":"string"},"retirement_date":{"type":"string"},"start_date":{"type":"string"},"support_policy":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EOLReleaseData":{"description":"advisory.EOLReleaseData","properties":{"already_eol":{"type":"boolean"},"branch":{"description":"Alpine Linux","type":"string"},"branch_url":{"description":"Alpine Linux","type":"string"},"codename":{"type":"string"},"cpe":{"type":"string"},"eol_date":{"type":"string"},"eol_date_extended_support":{"description":"Oracle Linux, Solaris","type":"string"},"eol_date_premier_support":{"description":"Oracle Linux, Solaris","type":"string"},"eol_elts_date":{"type":"string"},"eol_lts_date":{"type":"string"},"git_branch":{"description":"Alpine Linux","type":"string"},"git_branch_url":{"description":"Alpine Linux","type":"string"},"lts":{"description":"Ubuntu","type":"boolean"},"minor_releases":{"description":"Alpine Linux","items":{"type":"string"},"type":"array","uniqueItems":false},"product":{"type":"string"},"release_date":{"type":"string"},"release_name":{"type":"string"},"source_url":{"type":"string"},"technology_level":{"description":"AIX","type":"string"},"vendor":{"type":"string"},"version":{"type":"string"},"version_api":{"description":"Android","type":"string"},"version_darwin":{"description":"macOS","type":"string"},"version_sunos":{"description":"Solaris","type":"string"},"windows_current_build":{"description":"Microsoft Windows","type":"string"},"windows_display_version":{"description":"Microsoft Windows","type":"string"},"windows_edition_id":{"description":"Microsoft Windows","type":"string"},"windows_insider_preview":{"description":"Microsoft Windows","type":"boolean"}},"type":"object"},"advisory.EUVD":{"description":"advisory.EUVD","properties":{"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"assigner":{"type":"string"},"base_score":{"type":"number"},"base_score_vector":{"type":"string"},"base_score_version":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_updated":{"type":"string"},"description":{"type":"string"},"enisa_id_product":{"items":{"$ref":"#/components/schemas/advisory.EnisaIDProduct"},"type":"array","uniqueItems":false},"enisa_id_vendor":{"items":{"$ref":"#/components/schemas/advisory.EnisaIDVendor"},"type":"array","uniqueItems":false},"epss":{"type":"number"},"exploited":{"description":"This field is exploited field from endpoint /api/vulnerabilities.\napidocs : https://euvd.enisa.europa.eu/apidoc\nNote: There are records where exploited_since is populated with a valid date,\nbut it still shows up under non_exploitable data set","type":"boolean"},"exploited_since":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.EatonAdvisory":{"description":"advisory.EatonAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"eaton_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EcoSystem":{"description":"advisory.EcoSystem","properties":{"severity":{"type":"string"},"spl":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.Elastic":{"description":"advisory.Elastic","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"esaid":{"type":"string"},"remediation":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.Elspec":{"description":"advisory.Elspec","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EmergingThreatsSnort":{"description":"advisory.EmergingThreatsSnort","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"rev":{"type":"string"},"rule_disabled":{"type":"boolean"},"rule_name":{"type":"string"},"sid":{"type":"integer"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EmersonAdvisory":{"description":"advisory.EmersonAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"emerson_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EndOfLife":{"description":"advisory.EndOfLife","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cycles":{"items":{"$ref":"#/components/schemas/advisory.Cycle"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"name":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Endress":{"description":"advisory.Endress","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"impact":{"type":"string"},"mitigation":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EnisaIDProduct":{"description":"advisory.EnisaIDProduct","properties":{"id":{"type":"string"},"product_name":{"type":"string"},"product_version":{"type":"string"}},"type":"object"},"advisory.EnisaIDVendor":{"description":"advisory.EnisaIDVendor","properties":{"id":{"type":"string"},"vendor_name":{"type":"string"}},"type":"object"},"advisory.Event":{"description":"advisory.Event","properties":{"fixed":{"type":"string"},"introduced":{"type":"string"},"last_affected":{"type":"string"},"limit":{"type":"string"}},"type":"object"},"advisory.ExodusIntel":{"description":"advisory.ExodusIntel","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"disclosed_public":{"type":"string"},"disclosed_vendor":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ExploitDBExploitv2":{"description":"advisory.ExploitDBExploitv2","properties":{"author":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"edb_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ExternalReferences":{"description":"advisory.ExternalReferences","properties":{"description":{"type":"string"},"external_id":{"type":"string"},"source_name":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.F5":{"description":"advisory.F5","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FSecure":{"description":"advisory.FSecure","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Fanuc":{"description":"advisory.Fanuc","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Fastly":{"description":"advisory.Fastly","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Festo":{"description":"advisory.Festo","properties":{"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FileCloud":{"description":"advisory.FileCloud","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FileZilla":{"description":"advisory.FileZilla","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FixAff":{"description":"advisory.FixAff","properties":{"affected_since":{"type":"string"},"fixed_version":{"type":"string"},"patch_url":{"type":"string"}},"type":"object"},"advisory.Flag":{"description":"advisory.Flag","properties":{"date":{"type":"string"},"group_ids":{"items":{"type":"string"},"type":"array","uniqueItems":false},"label":{"type":"string"},"product_ids":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.FlattSecurity":{"description":"advisory.FlattSecurity","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ForgeRock":{"description":"advisory.ForgeRock","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FortinetAdvisory":{"description":"advisory.FortinetAdvisory","properties":{"acknowledgement":{"type":"string"},"affectedProducts":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvssv3":{"type":"string"},"date_added":{"type":"string"},"irnumber":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"solutions":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.FortinetIPS":{"description":"advisory.FortinetIPS","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"epss":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Foxit":{"description":"advisory.Foxit","properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.FoxitAffected"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FoxitAffected":{"description":"advisory.FoxitAffected","properties":{"product":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Fresenius":{"description":"advisory.Fresenius","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GCP":{"description":"advisory.GCP","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GEGas":{"description":"advisory.GEGas","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GEHealthcareAdvisory":{"description":"advisory.GEHealthcareAdvisory","properties":{"base_score":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_updated":{"type":"string"},"description":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GHAdvisoryJSONLean":{"description":"advisory.GHAdvisoryJSONLean","properties":{"classification":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"$ref":"#/components/schemas/advisory.GHCvss"},"cwes":{"$ref":"#/components/schemas/advisory.Cwes"},"databaseId":{"type":"integer"},"date_added":{"type":"string"},"description":{"type":"string"},"ghsaId":{"type":"string"},"id":{"type":"string"},"identifiers":{"items":{"$ref":"#/components/schemas/advisory.GHIdentifier"},"type":"array","uniqueItems":false},"notificationsPermalink":{"type":"string"},"origin":{"type":"string"},"permalink":{"type":"string"},"publishedAt":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.GHReference"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"summary":{"type":"string"},"updated_at":{"type":"string"},"vulnerabilities":{"$ref":"#/components/schemas/advisory.GHVulnerabilities"},"withdrawnAt":{"type":"string"}},"type":"object"},"advisory.GHCvss":{"description":"advisory.GHCvss","properties":{"score":{"type":"number"},"vectorString":{"type":"string"}},"type":"object"},"advisory.GHIdentifier":{"description":"advisory.GHIdentifier","properties":{"type":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.GHNode":{"description":"advisory.GHNode","properties":{"package":{"$ref":"#/components/schemas/advisory.GHPackage"},"severity":{"type":"string"},"updatedAt":{"type":"string"},"vulnerableVersionRange":{"type":"string"}},"type":"object"},"advisory.GHPackage":{"description":"advisory.GHPackage","properties":{"ecosystem":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.GHReference":{"description":"advisory.GHReference","properties":{"url":{"type":"string"}},"type":"object"},"advisory.GHSA":{"description":"advisory.GHSA","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"ghsa":{"$ref":"#/components/schemas/advisory.OriginalGHSA"},"url":{"type":"string"}},"type":"object"},"advisory.GHSAAffected":{"description":"advisory.GHSAAffected","properties":{"ecosystem_specific":{"$ref":"#/components/schemas/advisory.GHSAEcoSystemSpecific"},"package":{"$ref":"#/components/schemas/advisory.GHSAPackage"},"ranges":{"items":{"$ref":"#/components/schemas/advisory.GHSARange"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.GHSADatabaseSpecific":{"description":"advisory.GHSADatabaseSpecific","properties":{"cwe_ids":{"items":{"type":"string"},"type":"array","uniqueItems":false},"github_reviewed":{"type":"boolean"},"github_reviewed_at":{"type":"string"},"nvd_published_at":{"type":"string"},"severity":{"type":"string"}},"type":"object"},"advisory.GHSAEcoSystemSpecific":{"description":"advisory.GHSAEcoSystemSpecific","properties":{"affected_functions":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.GHSAEvent":{"description":"advisory.GHSAEvent","properties":{"fixed":{"type":"string"},"introduced":{"type":"string"}},"type":"object"},"advisory.GHSAPackage":{"description":"advisory.GHSAPackage","properties":{"ecosystem":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.GHSARange":{"description":"advisory.GHSARange","properties":{"events":{"items":{"$ref":"#/components/schemas/advisory.GHSAEvent"},"type":"array","uniqueItems":false},"type":{"type":"string"}},"type":"object"},"advisory.GHSAReference":{"description":"advisory.GHSAReference","properties":{"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GHSASeverity":{"description":"advisory.GHSASeverity","properties":{"score":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.GHVulnerabilities":{"description":"advisory.GHVulnerabilities","properties":{"nodes":{"items":{"$ref":"#/components/schemas/advisory.GHNode"},"type":"array","uniqueItems":false},"totalCount":{"type":"integer"}},"type":"object"},"advisory.GMOCyberSecurity":{"description":"advisory.GMOCyberSecurity","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary_ja":{"type":"string"},"title_ja":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Gallagher":{"description":"advisory.Gallagher","properties":{"activeExploitation":{"type":"boolean"},"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"fixes":{"type":"string"},"reportedBy":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Gen":{"description":"advisory.Gen","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"id":{"description":"not all of them have this","type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GenericEOL":{"description":"advisory.GenericEOL","properties":{"core":{"$ref":"#/components/schemas/advisory.GenericEOLCore"},"product":{"$ref":"#/components/schemas/advisory.GenericEOLProduct"},"vcInfo":{"$ref":"#/components/schemas/advisory.GenericEOLVCInfo"}},"type":"object"},"advisory.GenericEOLCore":{"description":"advisory.GenericEOLCore","properties":{"end_of_life":{"type":"string"},"end_of_sales":{"type":"string"},"end_of_security_support":{"type":"string"},"last_updated":{"type":"string"}},"type":"object"},"advisory.GenericEOLProduct":{"description":"advisory.GenericEOLProduct","properties":{"product_name":{"type":"string"},"product_version":{"type":"string"},"vendor_name":{"type":"string"}},"type":"object"},"advisory.GenericEOLReference":{"description":"advisory.GenericEOLReference","properties":{"description":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GenericEOLVCInfo":{"description":"advisory.GenericEOLVCInfo","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.GenericEOLReference"},"type":"array","uniqueItems":false},"replacement":{"$ref":"#/components/schemas/advisory.GenericEOLProduct"},"updated_at":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Genetec":{"description":"advisory.Genetec","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Gigabyte":{"description":"advisory.Gigabyte","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"link":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.GitHubExploit":{"description":"advisory.GitHubExploit","properties":{"clone_https_url":{"type":"string"},"clone_ssh_url":{"type":"string"},"clone_ssh_url_cached":{"type":"string"},"currently_trending":{"type":"boolean"},"cve":{"type":"string"},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"exploit_type":{"type":"string"},"forks":{"type":"integer"},"html_url":{"type":"string"},"id":{"type":"string"},"language":{"type":"string"},"reference_url":{"type":"string"},"refsource":{"type":"string"},"repo_full_path":{"type":"string"},"repo_id":{"type":"string"},"repo_name":{"type":"string"},"repo_owner":{"type":"string"},"stars":{"type":"integer"}},"type":"object"},"advisory.GitLabExploit":{"description":"advisory.GitLabExploit","properties":{"clone_https_url":{"type":"string"},"clone_ssh_url":{"type":"string"},"clone_ssh_url_cached":{"type":"string"},"cve":{"type":"string"},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"exploit_type":{"type":"string"},"forks":{"type":"integer"},"html_url":{"type":"string"},"language":{"type":"string"},"reference_url":{"type":"string"},"refsource":{"type":"string"},"repo_full_path":{"type":"string"},"repo_id":{"type":"string"},"repo_name":{"type":"string"},"repo_owner":{"type":"string"},"stars":{"type":"integer"}},"type":"object"},"advisory.GiteeExploit":{"description":"advisory.GiteeExploit","properties":{"clone_https_url":{"type":"string"},"clone_ssh_url":{"type":"string"},"clone_ssh_url_cached":{"type":"string"},"cve":{"type":"string"},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"exploit_type":{"type":"string"},"forks":{"type":"integer"},"html_url":{"type":"string"},"language":{"type":"string"},"reference_url":{"type":"string"},"refsource":{"type":"string"},"repo_full_path":{"type":"string"},"repo_id":{"type":"string"},"repo_name":{"type":"string"},"repo_owner":{"type":"string"},"stars":{"type":"integer"}},"type":"object"},"advisory.GitlabAdvisory":{"description":"advisory.GitlabAdvisory","properties":{"affected_range":{"type":"string"},"affected_versions":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_v2":{"type":"string"},"cvss_v3":{"type":"string"},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"filename":{"type":"string"},"fixed_versions":{"items":{"type":"string"},"type":"array","uniqueItems":false},"ghsa":{"items":{"type":"string"},"type":"array","uniqueItems":false},"gitlab_url":{"type":"string"},"identifier":{"type":"string"},"identifiers":{"items":{"type":"string"},"type":"array","uniqueItems":false},"not_impacted":{"type":"string"},"package_manager":{"type":"string"},"package_name":{"type":"string"},"package_slug":{"type":"string"},"pubdate":{"type":"string"},"solution":{"type":"string"},"title":{"type":"string"},"urls":{"items":{"type":"string"},"type":"array","uniqueItems":false},"uuid":{"type":"string"}},"type":"object"},"advisory.Glibc":{"description":"advisory.Glibc","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GnuTLS":{"description":"advisory.GnuTLS","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GoCredits":{"description":"advisory.GoCredits","properties":{"name":{"type":"string"}},"type":"object"},"advisory.GoEvent":{"description":"advisory.GoEvent","properties":{"fixed":{"type":"string"},"introduced":{"type":"string"}},"type":"object"},"advisory.GoVulnAffected":{"description":"advisory.GoVulnAffected","properties":{"database_specific":{"$ref":"#/components/schemas/advisory.GoVulnDatabaseSpecific"},"ecosystem_specific":{"$ref":"#/components/schemas/advisory.GoVulnEcosystemSpecific"},"package":{"$ref":"#/components/schemas/advisory.GoVulnPackage"},"ranges":{"items":{"$ref":"#/components/schemas/advisory.GoVulnRanges"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.GoVulnDatabaseSpecific":{"description":"advisory.GoVulnDatabaseSpecific","properties":{"url":{"type":"string"}},"type":"object"},"advisory.GoVulnEcosystemSpecific":{"description":"advisory.GoVulnEcosystemSpecific","properties":{"imports":{"items":{"$ref":"#/components/schemas/advisory.GoVulnImport"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.GoVulnImport":{"description":"advisory.GoVulnImport","properties":{"path":{"type":"string"},"symbols":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.GoVulnJSON":{"description":"advisory.GoVulnJSON","properties":{"advisory_url":{"type":"string"},"affected":{"items":{"$ref":"#/components/schemas/advisory.GoVulnAffected"},"type":"array","uniqueItems":false},"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"credits":{"items":{"$ref":"#/components/schemas/advisory.GoCredits"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"type":"string"},"ghsa":{"items":{"type":"string"},"type":"array","uniqueItems":false},"go_advisory_id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.GoVulnReference"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.GoVulnPackage":{"description":"advisory.GoVulnPackage","properties":{"ecosystem":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.GoVulnRanges":{"description":"advisory.GoVulnRanges","properties":{"events":{"items":{"$ref":"#/components/schemas/advisory.GoEvent"},"type":"array","uniqueItems":false},"type":{"type":"string"}},"type":"object"},"advisory.GoVulnReference":{"description":"advisory.GoVulnReference","properties":{"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Grafana":{"description":"advisory.Grafana","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GreyNoiseDetection":{"description":"advisory.GreyNoiseDetection","properties":{"category":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"intention":{"type":"string"},"label":{"type":"string"},"name":{"type":"string"},"recommend_block":{"type":"boolean"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"related_tags":{"items":{"$ref":"#/components/schemas/advisory.GreyNoiseTags"},"type":"array","uniqueItems":false},"slug":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GreyNoiseTags":{"description":"advisory.GreyNoiseTags","properties":{"category":{"type":"string"},"id":{"type":"string"},"intention":{"type":"string"},"name":{"type":"string"},"slug":{"type":"string"}},"type":"object"},"advisory.HCL":{"description":"advisory.HCL","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HIKVision":{"description":"advisory.HIKVision","properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"link":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.HKCert":{"description":"advisory.HKCert","properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"impact":{"type":"string"},"link":{"type":"string"},"relatedLinks":{"items":{"type":"string"},"type":"array"},"risk":{"type":"string"},"solutions":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.HMS":{"description":"advisory.HMS","properties":{"affected_products":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"impact":{"type":"string"},"mitigation":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HP":{"description":"advisory.HP","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"link":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.HPE":{"description":"advisory.HPE","properties":{"csaf":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Hacktivity":{"description":"advisory.Hacktivity","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"float64":{"type":"number"},"rank":{"type":"integer"},"reports_submitted":{"type":"integer"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HardwareUpdate":{"description":"advisory.HardwareUpdate","properties":{"affectedVersions":{"type":"string"},"cves":{"items":{"type":"string"},"type":"array"},"hardwarePlatform":{"type":"string"},"system":{"type":"string"},"updatedVersion":{"type":"string"}},"type":"object"},"advisory.HarmonyOS":{"description":"advisory.HarmonyOS","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HashiCorp":{"description":"advisory.HashiCorp","properties":{"affected_products":{"type":"string"},"background":{"type":"string"},"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"type":"string"},"remediation":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HaskellAffected":{"description":"advisory.HaskellAffected","properties":{"affected_constraint":{"type":"string"},"affected_versions":{"items":{"$ref":"#/components/schemas/advisory.HaskellVersion"},"type":"array","uniqueItems":false},"arch":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"os":{"items":{"type":"string"},"type":"array","uniqueItems":false},"package":{"type":"string"}},"type":"object"},"advisory.HaskellSADBAdvisory":{"description":"advisory.HaskellSADBAdvisory","properties":{"advisory_id":{"type":"string"},"affected_packages":{"items":{"$ref":"#/components/schemas/advisory.HaskellAffected"},"type":"array","uniqueItems":false},"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwes":{"items":{"type":"integer"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"keywords":{"items":{"type":"string"},"type":"array","uniqueItems":false},"references":{"additionalProperties":{"items":{"type":"string"},"type":"array"},"type":"object"},"related_vulns":{"items":{"type":"string"},"type":"array","uniqueItems":false},"updated_at":{"type":"string"}},"type":"object"},"advisory.HaskellVersion":{"description":"advisory.HaskellVersion","properties":{"fixed":{"type":"string"},"introduced":{"type":"string"}},"type":"object"},"advisory.HillromAdvisory":{"description":"advisory.HillromAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Hitachi":{"description":"advisory.Hitachi","properties":{"affectedProducts":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixedProducts":{"type":"string"},"hitachiId":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HitachiEnergy":{"description":"advisory.HitachiEnergy","properties":{"advisory_id":{"type":"string"},"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"exploited":{"type":"boolean"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Honeywell":{"description":"advisory.Honeywell","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Huawei":{"description":"advisory.Huawei","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"sa_number":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HuaweiEulerOS":{"description":"advisory.HuaweiEulerOS","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"integer"},"packages":{"type":"string"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"synopsis":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HuaweiIPS":{"description":"advisory.HuaweiIPS","properties":{"cnnvd":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_updated":{"type":"string"},"name":{"type":"string"},"severity":{"type":"string"},"threat_id":{"type":"integer"},"url":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.IAVA":{"description":"advisory.IAVA","properties":{"IAVA":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.IBM":{"description":"advisory.IBM","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ITW":{"description":"advisory.ITW","properties":{"cve":{"type":"string"},"date_added":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.ITWExploit":{"description":"advisory.ITWExploit","properties":{"advisory":{"type":"string"},"affected_versions":{"type":"string"},"analysis_url":{"type":"string"},"bug_introducing_change_list_url":{"type":"string"},"claimed_attribution":{"type":"string"},"claimed_attribution_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_discovered":{"type":"string"},"date_patched":{"type":"string"},"description":{"type":"string"},"first_patched_version":{"type":"string"},"patch_change_list_url":{"type":"string"},"product":{"type":"string"},"reported_by":{"type":"string"},"root_cause_analysis_url":{"type":"string"},"vendor":{"type":"string"},"vulnerability_type":{"type":"string"}},"type":"object"},"advisory.IVal":{"description":"advisory.IVal","properties":{"Value":{"type":"string"}},"type":"object"},"advisory.Idemia":{"description":"advisory.Idemia","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"sbid":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.IdentificationHelper":{"additionalProperties":{},"description":"advisory.IdentificationHelper","type":"object"},"advisory.Igel":{"description":"advisory.Igel","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Impact":{"description":"advisory.Impact","properties":{"capecId":{"type":"string"},"descriptions":{"items":{"$ref":"#/components/schemas/advisory.MDescriptions"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.IncibeAdvisory":{"description":"advisory.IncibeAdvisory","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"detail":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"solution":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.Intel":{"description":"advisory.Intel","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"link":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.IpIntelRecord":{"description":"advisory.IpIntelRecord","properties":{"asn":{"type":"string"},"city":{"type":"string"},"country":{"type":"string"},"country_code":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"feed_ids":{"items":{"type":"string"},"type":"array","uniqueItems":false},"hostnames":{"items":{"type":"string"},"type":"array","uniqueItems":false},"ip":{"type":"string"},"lastSeen":{"type":"string"},"matches":{"items":{"type":"string"},"type":"array","uniqueItems":false},"port":{"type":"integer"},"ssl":{"type":"boolean"},"type":{"$ref":"#/components/schemas/advisory.RecordType"}},"type":"object"},"advisory.IsraeliAlert":{"description":"advisory.IsraeliAlert","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details_he":{"type":"string"},"handling_he":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary_he":{"type":"string"},"title_he":{"type":"string"}},"type":"object"},"advisory.IsraeliVulnerability":{"description":"advisory.IsraeliVulnerability","properties":{"ILVNId":{"type":"string"},"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"solution":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Issued":{"description":"advisory.Issued","type":"object"},"advisory.Istio":{"description":"advisory.Istio","properties":{"affected_version":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Ivanti":{"description":"advisory.Ivanti","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.IvantiRSS":{"description":"advisory.IvantiRSS","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.JFrog":{"description":"advisory.JFrog","properties":{"cpes":{"items":{"$ref":"#/components/schemas/advisory.NVD20CVECPEMatch"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"product":{"type":"string"},"severity":{"type":"string"},"summary":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"versions":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.JNJAdvisory":{"description":"advisory.JNJAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.JVN":{"description":"advisory.JVN","properties":{"affected_en":{"type":"string"},"affected_ja":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description_en":{"type":"string"},"description_ja":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"solution_en":{"type":"string"},"solution_ja":{"type":"string"},"summary_en":{"type":"string"},"summary_ja":{"type":"string"},"title_en":{"type":"string"},"title_ja":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.JVNAdvisoryItem":{"description":"advisory.JVNAdvisoryItem","properties":{"cpe":{"items":{"$ref":"#/components/schemas/advisory.JVNCPE"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"items":{"$ref":"#/components/schemas/advisory.CVSS"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"description_en":{"type":"string"},"identifier":{"type":"string"},"issued":{"type":"string"},"modified":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.JVNReference"},"type":"array","uniqueItems":false},"title":{"type":"string"},"title_en":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"url_en":{"type":"string"}},"type":"object"},"advisory.JVNCPE":{"description":"advisory.JVNCPE","properties":{"cpe":{"type":"string"},"product":{"type":"string"},"vendor":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.JVNReference":{"description":"advisory.JVNReference","properties":{"id":{"type":"string"},"source":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.Jenkins":{"description":"advisory.Jenkins","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fix":{"type":"string"},"link":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.JetBrains":{"description":"advisory.JetBrains","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"product":{"type":"string"},"resolved_in":{"items":{"type":"string"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.JohnsonControls":{"description":"advisory.JohnsonControls","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Juniper":{"description":"advisory.Juniper","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss3_score":{"type":"string"},"cvss3_vector":{"type":"string"},"cvss4_score":{"type":"string"},"cvss4_vector":{"type":"string"},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.K8S":{"description":"advisory.K8S","properties":{"content":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"issue_id":{"type":"integer"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.KEVCatalogVulnerability":{"description":"advisory.KEVCatalogVulnerability","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwes":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"dueDate":{"type":"string"},"knownRansomwareCampaignUse":{"type":"string"},"notes":{"type":"string"},"product":{"type":"string"},"requiredAction":{"type":"string"},"shortDescription":{"type":"string"},"vendorProject":{"type":"string"},"vulnerabilityName":{"type":"string"}},"type":"object"},"advisory.KRCertAdvisory":{"description":"advisory.KRCertAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description_ko":{"type":"string"},"link":{"type":"string"},"overview_ko":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title_ko":{"type":"string"}},"type":"object"},"advisory.KasperskyICSCERTAdvisory":{"description":"advisory.KasperskyICSCERTAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"klcert_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Kb":{"description":"advisory.Kb","properties":{"kb_url":{"type":"string"},"ms_date_added":{"type":"string"},"status":{"type":"string"},"supercedence":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.KbThreatDescription":{"description":"advisory.KbThreatDescription","properties":{"dos":{"type":"string"},"exploited":{"type":"string"},"latest_software_release":{"type":"string"},"level":{"items":{"type":"string"},"type":"array","uniqueItems":false},"older_software_release":{"type":"string"},"publicly_disclosed":{"type":"string"},"type":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.KoreLogic":{"description":"advisory.KoreLogic","properties":{"affected_product":{"type":"string"},"affected_vendor":{"type":"string"},"affected_version":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Kunbus":{"description":"advisory.Kunbus","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.LG":{"description":"advisory.LG","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Lantronix":{"description":"advisory.Lantronix","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Lenovo":{"description":"advisory.Lenovo","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"industry_identifiers":{"items":{"type":"string"},"type":"array","uniqueItems":false},"last_updated":{"type":"string"},"lenovo_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.LexmarkAdvisory":{"description":"advisory.LexmarkAdvisory","properties":{"affectedProducts":{"items":{"$ref":"#/components/schemas/advisory.AffectedProduct"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"type":"string"},"impact":{"type":"string"},"lastUpdate":{"type":"string"},"link":{"type":"string"},"publicReleaseDate":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"revision":{"type":"string"},"summary":{"type":"string"},"updated_at":{"type":"string"},"workarounds":{"type":"string"}},"type":"object"},"advisory.LibreOffice":{"description":"advisory.LibreOffice","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Linux":{"description":"advisory.Linux","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.LogSource":{"description":"advisory.LogSource","properties":{"category":{"type":"string"},"definition":{"type":"string"},"product":{"type":"string"},"service":{"type":"string"}},"type":"object"},"advisory.LolAdvs":{"description":"advisory.LolAdvs","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"lol_json":{"additionalProperties":{},"type":"object"},"mitre_id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MACert":{"description":"advisory.MACert","properties":{"affected_systems_fr":{"type":"string"},"assessment_fr":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"impact_fr":{"type":"string"},"reference":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"risk_fr":{"type":"string"},"risks_fr":{"type":"string"},"solution_fr":{"type":"string"},"title_fr":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MAffected":{"description":"advisory.MAffected","properties":{"collectionURL":{"type":"string"},"cpes":{"items":{"type":"string"},"type":"array","uniqueItems":false},"defaultStatus":{"type":"string"},"packageName":{"type":"string"},"packageURL":{"type":"string"},"platforms":{"items":{"type":"string"},"type":"array","uniqueItems":false},"product":{"type":"string"},"repo":{"type":"string"},"vendor":{"type":"string"},"versions":{"items":{"$ref":"#/components/schemas/advisory.MVersion"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.MBranch":{"description":"advisory.MBranch","properties":{"Branch":{"items":{"$ref":"#/components/schemas/advisory.MBranch"},"type":"array","uniqueItems":false},"FullProductName":{"items":{"$ref":"#/components/schemas/advisory.MFullProductName"},"type":"array","uniqueItems":false},"Items":{"items":{"$ref":"#/components/schemas/advisory.MItem"},"type":"array","uniqueItems":false},"name":{"type":"string"},"type":{"description":"diff","type":"integer"}},"type":"object"},"advisory.MCPEApplicability":{"description":"advisory.MCPEApplicability","properties":{"negate":{"type":"boolean"},"nodes":{"items":{"$ref":"#/components/schemas/advisory.MNodes"},"type":"array","uniqueItems":false},"operator":{"type":"string"}},"type":"object"},"advisory.MCPEMatch":{"description":"advisory.MCPEMatch","properties":{"criteria":{"type":"string"},"matchCriteriaId":{"type":"string"},"versionEndExcluding":{"type":"string"},"versionEndIncluding":{"type":"string"},"versionStartExcluding":{"type":"string"},"versionStartIncluding":{"type":"string"},"vulnerable":{"type":"boolean"}},"type":"object"},"advisory.MCna":{"description":"advisory.MCna","properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.MAffected"},"type":"array","uniqueItems":false},"cpeApplicability":{"items":{"$ref":"#/components/schemas/advisory.CustomCPE"},"type":"array","uniqueItems":false},"credits":{"items":{"$ref":"#/components/schemas/advisory.Credit"},"type":"array","uniqueItems":false},"descriptions":{"items":{"$ref":"#/components/schemas/advisory.MDescriptions"},"type":"array","uniqueItems":false},"impacts":{"items":{"$ref":"#/components/schemas/advisory.Impact"},"type":"array","uniqueItems":false},"metrics":{"items":{"$ref":"#/components/schemas/advisory.Metric"},"type":"array","uniqueItems":false},"problemTypes":{"items":{"$ref":"#/components/schemas/advisory.MProblemTypes"},"type":"array","uniqueItems":false},"providerMetadata":{"$ref":"#/components/schemas/advisory.MProviderMetadata"},"references":{"items":{"$ref":"#/components/schemas/advisory.MReference"},"type":"array","uniqueItems":false},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"timeline":{"items":{"$ref":"#/components/schemas/advisory.Timeline"},"type":"array","uniqueItems":false},"title":{"type":"string"}},"type":"object"},"advisory.MContainers":{"description":"advisory.MContainers","properties":{"adp":{"items":{"$ref":"#/components/schemas/advisory.ADPContainer"},"type":"array","uniqueItems":false},"cna":{"$ref":"#/components/schemas/advisory.MCna"}},"type":"object"},"advisory.MCveMetadata":{"description":"advisory.MCveMetadata","properties":{"assignerOrgId":{"type":"string"},"assignerShortName":{"type":"string"},"cveId":{"type":"string"},"datePublished":{"type":"string"},"dateReserved":{"type":"string"},"dateUpdated":{"type":"string"},"state":{"type":"string"}},"type":"object"},"advisory.MCvssV20":{"description":"advisory.MCvssV20","properties":{"accessVector":{"type":"string"},"attackComplexity":{"type":"string"},"authentication":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.MCvssV30":{"description":"advisory.MCvssV30","properties":{"attackComplexity":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"scope":{"type":"string"},"userInteraction":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.MCvssV31":{"description":"advisory.MCvssV31","properties":{"attackComplexity":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"scope":{"type":"string"},"userInteraction":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.MCvssV40":{"description":"advisory.MCvssV40","properties":{"attackComplexity":{"type":"string"},"attackRequirements":{"type":"string"},"attackVector":{"type":"string"},"automatable":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"privilegesRequired":{"type":"string"},"providerUrgency":{"type":"string"},"recovery":{"type":"string"},"safety":{"type":"string"},"subAvailabilityImpact":{"type":"string"},"subConfidentialityImpact":{"type":"string"},"subIntegrityImpact":{"type":"string"},"userInteraction":{"type":"string"},"valueDensity":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"},"vulnAvailabilityImpact":{"type":"string"},"vulnConfidentialityImpact":{"type":"string"},"vulnIntegrityImpact":{"type":"string"},"vulnerabilityResponseEffort":{"type":"string"}},"type":"object"},"advisory.MDescriptions":{"description":"advisory.MDescriptions","properties":{"lang":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.MDocumentTracking":{"description":"advisory.MDocumentTracking","properties":{"CurrentReleaseDate":{"type":"string"},"InitialReleaseDate":{"type":"string"},"identification":{"$ref":"#/components/schemas/advisory.MIdentification"},"revisionhistory":{"description":"diff in xml/json","items":{"$ref":"#/components/schemas/advisory.RRevision"},"type":"array","uniqueItems":false},"status":{"description":"again - change in json/xml","type":"integer"},"version":{"type":"string"}},"type":"object"},"advisory.MEProduct":{"description":"advisory.MEProduct","properties":{"ID":{"type":"string"},"display_value":{"type":"string"}},"type":"object"},"advisory.MFiles":{"description":"advisory.MFiles","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MFullProductName":{"description":"advisory.MFullProductName","properties":{"CPE":{"type":"string"},"ProductID":{"type":"string"},"Value":{"type":"string"}},"type":"object"},"advisory.MISPValueNoID":{"description":"advisory.MISPValueNoID","properties":{"description":{"type":"string"},"meta":{"$ref":"#/components/schemas/advisory.MispMeta"},"related":{"items":{"$ref":"#/components/schemas/advisory.MispRelatedItem"},"type":"array","uniqueItems":false},"value":{"type":"string"}},"type":"object"},"advisory.MITREAttackGroupNoID":{"description":"advisory.MITREAttackGroupNoID","properties":{"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"description":{"type":"string"},"name":{"type":"string"},"techniques":{"items":{"$ref":"#/components/schemas/advisory.MitreAttackTechnique"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.MIdentification":{"description":"advisory.MIdentification","properties":{"alias":{"$ref":"#/components/schemas/advisory.IVal"},"id":{"$ref":"#/components/schemas/advisory.IVal"}},"type":"object"},"advisory.MItem":{"description":"advisory.MItem","properties":{"Items":{"items":{"$ref":"#/components/schemas/advisory.MItem"},"type":"array","uniqueItems":false},"Name":{"type":"string"},"ProductID":{"type":"string"},"Type":{"description":"diff","type":"integer"},"Value":{"type":"string"}},"type":"object"},"advisory.MNodes":{"description":"advisory.MNodes","properties":{"cpeMatch":{"items":{"$ref":"#/components/schemas/advisory.MCPEMatch"},"type":"array","uniqueItems":false},"negate":{"type":"boolean"},"operator":{"type":"string"}},"type":"object"},"advisory.MProblemTypes":{"description":"advisory.MProblemTypes","properties":{"descriptions":{"items":{"$ref":"#/components/schemas/advisory.PTMDescriptions"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.MProductStatus":{"description":"advisory.MProductStatus","properties":{"ProductID":{"items":{"type":"string"},"type":"array","uniqueItems":false},"type":{"description":"diff","type":"integer"}},"type":"object"},"advisory.MProductTree":{"description":"advisory.MProductTree","properties":{"Branch":{"items":{"$ref":"#/components/schemas/advisory.MBranch"},"type":"array","uniqueItems":false},"FullProductName":{"items":{"$ref":"#/components/schemas/advisory.MFullProductName"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.MProviderMetadata":{"description":"OK","properties":{"dateUpdated":{"description":"FIXME: flip to time","type":"string"},"orgId":{"type":"string"},"shortName":{"type":"string"}},"type":"object"},"advisory.MReference":{"description":"advisory.MReference","properties":{"name":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.MRemediation":{"description":"advisory.MRemediation","properties":{"AffectedFiles":{"items":{"$ref":"#/components/schemas/advisory.AffectedFile"},"type":"array","uniqueItems":false},"Date":{"type":"string"},"DateSpecified":{"type":"boolean"},"Description":{"$ref":"#/components/schemas/advisory.IVal"},"FixedBuild":{"type":"string"},"ProductID":{"items":{"type":"string"},"type":"array","uniqueItems":false},"RestartRequired":{"$ref":"#/components/schemas/advisory.IVal"},"SubType":{"type":"string"},"Type":{"description":"diff","type":"integer"},"Url":{"type":"string"},"supercedence":{"type":"string"}},"type":"object"},"advisory.MSCVRF":{"description":"advisory.MSCVRF","properties":{"DocumentTitle":{"$ref":"#/components/schemas/advisory.MSDocumentTitle"},"DocumentTracking":{"$ref":"#/components/schemas/advisory.MDocumentTracking"},"ProductTree":{"$ref":"#/components/schemas/advisory.MProductTree"},"document_type":{"type":"string"},"documentnotes":{"description":"diff","items":{"$ref":"#/components/schemas/advisory.RNote"},"type":"array","uniqueItems":false},"documentpublisher":{"$ref":"#/components/schemas/advisory.DocumentPublisher"},"vulnerability":{"items":{"$ref":"#/components/schemas/advisory.MVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.MSDocumentTitle":{"description":"advisory.MSDocumentTitle","properties":{"Value":{"type":"string"}},"type":"object"},"advisory.MVersion":{"description":"advisory.MVersion","properties":{"lessThan":{"type":"string"},"lessThanOrEqual":{"type":"string"},"status":{"type":"string"},"version":{"type":"string"},"versionType":{"type":"string"}},"type":"object"},"advisory.MVulnerability":{"description":"advisory.MVulnerability","properties":{"ProductStatuses":{"items":{"$ref":"#/components/schemas/advisory.MProductStatus"},"type":"array","uniqueItems":false},"Remediations":{"items":{"$ref":"#/components/schemas/advisory.MRemediation"},"type":"array","uniqueItems":false},"Threats":{"items":{"$ref":"#/components/schemas/advisory.RThreat"},"type":"array","uniqueItems":false},"acknowledgments":{"items":{"$ref":"#/components/schemas/advisory.Acknowledgement"},"type":"array","uniqueItems":false},"cve":{"type":"string"},"cvssscoresets":{"items":{"$ref":"#/components/schemas/advisory.RScoreSet"},"type":"array","uniqueItems":false},"notes":{"items":{"$ref":"#/components/schemas/advisory.Note"},"type":"array","uniqueItems":false},"ordinal":{"type":"string"},"revisionhistory":{"description":"diff in xml/json","items":{"$ref":"#/components/schemas/advisory.RRevision"},"type":"array","uniqueItems":false},"title":{"$ref":"#/components/schemas/advisory.IVal"}},"type":"object"},"advisory.MaliciousPackage":{"description":"advisory.MaliciousPackage","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"malware":{"$ref":"#/components/schemas/advisory.OSVObj"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MaliciousVSCodeExts":{"description":"advisory.MaliciousVSCodeExts","properties":{"date_added":{"type":"string"},"name":{"type":"string"},"publisher":{"type":"string"},"type":{"type":"string"},"updated_at":{"description":"the data in this feed comes from manual curation. so this will likely be omitted.","type":"string"},"url":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.ManageEngine":{"description":"advisory.ManageEngine","properties":{"ADVISORY":{"type":"string"},"Added_Time":{"type":"string"},"CVE_Details_Link":{"$ref":"#/components/schemas/advisory.CVEDetailsLink"},"CVE_ID":{"type":"string"},"CVSS_Severity_Rating":{"type":"string"},"Fixed":{"type":"string"},"For_product_search":{"type":"string"},"ID":{"type":"string"},"Product":{"$ref":"#/components/schemas/advisory.MEProduct"},"Product_list":{"items":{"$ref":"#/components/schemas/advisory.MEProduct"},"type":"array","uniqueItems":false},"Product_specific_details":{"items":{"$ref":"#/components/schemas/advisory.ProductSpecificDetail"},"type":"array","uniqueItems":false},"Summary":{"type":"string"},"Version":{"type":"string"},"index_field":{"type":"string"}},"type":"object"},"advisory.ManageEngineAdvisory":{"description":"advisory.ManageEngineAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"manage_engine":{"$ref":"#/components/schemas/advisory.ManageEngine"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MbedTLS":{"description":"advisory.MbedTLS","properties":{"affects":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.McAfee":{"description":"advisory.McAfee","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"mcafee_score":{"items":{"$ref":"#/components/schemas/advisory.McAfeeScore"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.McAfeeScore":{"description":"advisory.McAfeeScore","properties":{"base":{"type":"string"},"cve":{"type":"string"},"temporal":{"type":"string"},"vector":{"type":"string"}},"type":"object"},"advisory.Mediatek":{"description":"advisory.Mediatek","properties":{"affected_chipsets":{"items":{"type":"string"},"type":"array","uniqueItems":false},"affected_software":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MedtronicAdvisory":{"description":"advisory.MedtronicAdvisory","properties":{"affected_products":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Mendix":{"description":"advisory.Mendix","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"id":{"type":"string"},"mendix_id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MetaAdvisories":{"description":"advisory.MetaAdvisories","properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.MAffected"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MetaData":{"description":"advisory.MetaData","properties":{"advisory":{"$ref":"#/components/schemas/advisory.AdvisoryDetails"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"packages":{"items":{"$ref":"#/components/schemas/advisory.VulnCheckPackage"},"type":"array","uniqueItems":false},"references":{"items":{"$ref":"#/components/schemas/advisory.OvalReference"},"type":"array","uniqueItems":false},"title":{"type":"string"}},"type":"object"},"advisory.MetasploitExploit":{"description":"advisory.MetasploitExploit","properties":{"author":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Metric":{"description":"advisory.Metric","properties":{"cvssV2_0":{"$ref":"#/components/schemas/advisory.MCvssV20"},"cvssV3_0":{"$ref":"#/components/schemas/advisory.MCvssV30"},"cvssV3_1":{"$ref":"#/components/schemas/advisory.MCvssV31"},"cvssV4_0":{"$ref":"#/components/schemas/advisory.MCvssV40"},"format":{"type":"string"},"other":{"$ref":"#/components/schemas/advisory.MetricsOther"},"scenarios":{"items":{"$ref":"#/components/schemas/advisory.MetricScenario"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.MetricScenario":{"description":"advisory.MetricScenario","properties":{"lang":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.MetricsOther":{"description":"advisory.MetricsOther","properties":{"content":{"type":"object"},"type":{"type":"string"}},"type":"object"},"advisory.MicrosoftCSAF":{"description":"advisory.MicrosoftCSAF","properties":{"csaf":{"$ref":"#/components/schemas/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MicrosoftCVRF":{"description":"advisory.MicrosoftCVRF","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvrf":{"$ref":"#/components/schemas/advisory.MSCVRF"},"date_added":{"type":"string"},"exploited_list":{"items":{"$ref":"#/components/schemas/advisory.ITW"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MicrosoftDriverBlockList":{"description":"advisory.MicrosoftDriverBlockList","properties":{"date_added":{"type":"string"},"file_id":{"description":"From FileAttrib or Deny","type":"string"},"file_metadata":{"$ref":"#/components/schemas/advisory.MicrosoftFileMetadata"}},"type":"object"},"advisory.MicrosoftFileMetadata":{"description":"File-level metadata","properties":{"file_name":{"description":"Full path (FilePath + FileName or FriendlyName)","type":"string"},"maximum_file_version":{"type":"string"},"minimum_file_version":{"type":"string"},"product_name":{"type":"string"},"sha1_hash":{"type":"string"},"sha256_hash":{"type":"string"}},"type":"object"},"advisory.MicrosoftKb":{"description":"advisory.MicrosoftKb","properties":{"cve":{"type":"string"},"date_added":{"type":"string"},"kbs":{"items":{"$ref":"#/components/schemas/advisory.Kb"},"type":"array","uniqueItems":false},"threat":{"$ref":"#/components/schemas/advisory.KbThreatDescription"},"title":{"type":"string"}},"type":"object"},"advisory.Mikrotik":{"description":"advisory.Mikrotik","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Mindray":{"description":"advisory.Mindray","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MispMeta":{"description":"advisory.MispMeta","properties":{"attribution-confidence":{"type":"string"},"cfr-suspected-state-sponsor":{"type":"string"},"cfr-suspected-victims":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cfr-target-category":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cfr-type-of-incident":{"items":{"type":"string"},"type":"array","uniqueItems":false},"country":{"type":"string"},"refs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"synonyms":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.MispRelatedItem":{"description":"advisory.MispRelatedItem","properties":{"dest-uuid":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"type":{"type":"string"}},"type":"object"},"advisory.MispValue":{"description":"advisory.MispValue","properties":{"description":{"type":"string"},"meta":{"$ref":"#/components/schemas/advisory.MispMeta"},"related":{"items":{"$ref":"#/components/schemas/advisory.MispRelatedItem"},"type":"array","uniqueItems":false},"uuid":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.Mitel":{"description":"advisory.Mitel","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MitreAttackRef":{"description":"advisory.MitreAttackRef","properties":{"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MitreAttackTechWithRefs":{"description":"advisory.MitreAttackTechWithRefs","properties":{"domain":{"type":"string"},"id":{"type":"string"},"name":{"type":"string"},"nist_controls":{"items":{"$ref":"#/components/schemas/advisory.NISTControl"},"type":"array","uniqueItems":false},"references":{"items":{"$ref":"#/components/schemas/advisory.MitreAttackRef"},"type":"array","uniqueItems":false},"subtechnique":{"type":"boolean"},"tactics":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.MitreAttackTechnique":{"description":"advisory.MitreAttackTechnique","properties":{"sub_technique":{"type":"string"},"sub_technique_name":{"type":"string"},"tactic":{"items":{"type":"string"},"type":"array","uniqueItems":false},"technique_id":{"type":"string"},"technique_name":{"type":"string"}},"type":"object"},"advisory.MitreCVEListV5":{"description":"advisory.MitreCVEListV5","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"mitre_ref":{"$ref":"#/components/schemas/advisory.MitreCVEListV5Ref"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MitreCVEListV5Ref":{"description":"advisory.MitreCVEListV5Ref","properties":{"containers":{"$ref":"#/components/schemas/advisory.MContainers"},"cveMetadata":{"$ref":"#/components/schemas/advisory.MCveMetadata"},"dataType":{"type":"string"},"dataVersion":{"type":"string"}},"type":"object"},"advisory.MitreGroupCTI":{"description":"advisory.MitreGroupCTI","properties":{"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"description":{"type":"string"},"id":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.ExternalReferences"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.MitsubishiElectricAdvisory":{"description":"advisory.MitsubishiElectricAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_revised":{"description":"could nuke this at some pt in the future as it's a dupe","type":"string"},"mitsubishi_electric_id":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MongoDB":{"description":"advisory.MongoDB","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"score":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MoxaAdvisory":{"description":"advisory.MoxaAdvisory","properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MozillaAdvisory":{"description":"advisory.MozillaAdvisory","properties":{"affected_components":{"items":{"$ref":"#/components/schemas/advisory.MozillaComponent"},"type":"array","uniqueItems":false},"bugzilla":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"fixed_in":{"items":{"type":"string"},"type":"array","uniqueItems":false},"impact":{"type":"string"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"reporter":{"type":"string"},"risk":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MozillaComponent":{"description":"advisory.MozillaComponent","properties":{"bugzilla":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"description":{"type":"string"},"impact":{"type":"string"},"reporter":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.NCSC":{"description":"advisory.NCSC","properties":{"csaf":{"$ref":"#/components/schemas/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary_nl":{"type":"string"},"title_nl":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NCSCCVE":{"description":"advisory.NCSCCVE","properties":{"csaf":{"$ref":"#/components/schemas/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary_nl":{"type":"string"},"title_nl":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NEC":{"description":"advisory.NEC","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"nvd_id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NHS":{"description":"advisory.NHS","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"summary":{"type":"string"},"threat_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NI":{"description":"advisory.NI","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"ovewrview":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NISTControl":{"description":"advisory.NISTControl","properties":{"cis_controls":{"items":{"$ref":"#/components/schemas/advisory.CISControl"},"type":"array","uniqueItems":false},"nist_control_family":{"type":"string"},"nist_control_id":{"type":"string"},"nist_control_name":{"type":"string"}},"type":"object"},"advisory.NTP":{"description":"advisory.NTP","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NVD20CVECPEMatch":{"description":"advisory.NVD20CVECPEMatch","properties":{"criteria":{"type":"string"},"matchCriteriaId":{"type":"string"},"versionEndExcluding":{"type":"string"},"versionEndIncluding":{"type":"string"},"versionStartExcluding":{"type":"string"},"versionStartIncluding":{"type":"string"},"vulnerable":{"type":"boolean"}},"type":"object"},"advisory.NVD20Configuration":{"description":"advisory.NVD20Configuration","properties":{"negate":{"type":"boolean"},"nodes":{"items":{"$ref":"#/components/schemas/advisory.NVD20Node"},"type":"array","uniqueItems":false},"operator":{"type":"string"}},"type":"object"},"advisory.NVD20Node":{"description":"advisory.NVD20Node","properties":{"cpeMatch":{"items":{"$ref":"#/components/schemas/advisory.NVD20CVECPEMatch"},"type":"array","uniqueItems":false},"negate":{"type":"boolean"},"operator":{"type":"string"}},"type":"object"},"advisory.NVD20Source":{"description":"advisory.NVD20Source","properties":{"contactEmail":{"type":"string"},"created":{"type":"string"},"cweAcceptanceLevel":{"$ref":"#/components/schemas/advisory.CweAcceptanceLevel"},"lastModified":{"type":"string"},"name":{"type":"string"},"sourceIdentifiers":{"items":{"type":"string"},"type":"array","uniqueItems":false},"v3AcceptanceLevel":{"$ref":"#/components/schemas/advisory.V3AcceptanceLevel"}},"type":"object"},"advisory.NVDCPEDictionary":{"description":"advisory.NVDCPEDictionary","properties":{"backupOnly":{"type":"string"}},"type":"object"},"advisory.NZAdvisory":{"description":"advisory.NZAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"happening":{"type":"string"},"link":{"type":"string"},"lookFor":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"whatToDo":{"type":"string"}},"type":"object"},"advisory.Naver":{"description":"advisory.Naver","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Nessus":{"description":"advisory.Nessus","properties":{"cpe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"exploitability_ease":{"description":"seems like only 3 vals for this","type":"string"},"filename":{"type":"string"},"iava":{"items":{"type":"string"},"type":"array","uniqueItems":false},"name":{"type":"string"},"script_id":{"type":"integer"},"updated":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NetApp":{"description":"advisory.NetApp","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"impact":{"type":"string"},"ntap":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Netatalk":{"description":"advisory.Netatalk","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Netgate":{"description":"advisory.Netgate","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Netgear":{"description":"advisory.Netgear","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"psvn_number":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Netskope":{"description":"advisory.Netskope","properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Nexpose":{"description":"advisory.Nexpose","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"identifier":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NginxAdvisory":{"description":"advisory.NginxAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"not_vuln_versions":{"items":{"type":"string"},"type":"array","uniqueItems":false},"patch_pgp":{"type":"string"},"patch_url":{"type":"string"},"severity":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vuln_versions":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.NodeAuthor":{"description":"advisory.NodeAuthor","properties":{"author":{"type":"string"},"username":{"type":"string"},"website":{"type":"string"}},"type":"object"},"advisory.NodeJS":{"description":"advisory.NodeJS","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NodeSecurity":{"description":"advisory.NodeSecurity","properties":{"affected_environments":{"items":{"type":"string"},"type":"array","uniqueItems":false},"author":{"$ref":"#/components/schemas/advisory.NodeAuthor"},"coordinating_vendor":{"type":"string"},"created_at":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"number"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"id":{"type":"integer"},"module_name":{"type":"string"},"overview":{"type":"string"},"patched_versions":{"type":"string"},"publish_date":{"type":"string"},"recommendation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vulnerable_versions":{"type":"string"}},"type":"object"},"advisory.Nokia":{"description":"advisory.Nokia","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Note":{"description":"advisory.Note","properties":{"ordinal":{"type":"string"},"text":{"type":"string"},"title":{"type":"string"},"type":{"type":"integer"}},"type":"object"},"advisory.NotePadPlusPlus":{"description":"advisory.NotePadPlusPlus","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Nozomi":{"description":"advisory.Nozomi","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Nuclei":{"description":"advisory.Nuclei","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"template":{"type":"object"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NvidiaRevision":{"description":"advisory.NvidiaRevision","properties":{"date":{"type":"string"},"description":{"type":"string"},"revision":{"type":"string"}},"type":"object"},"advisory.OCurl":{"description":"advisory.OCurl","properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.CurlAffected"},"type":"array","uniqueItems":false},"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"credits":{"items":{"$ref":"#/components/schemas/advisory.CurlCredit"},"type":"array","uniqueItems":false},"database_specific":{"$ref":"#/components/schemas/advisory.DBSpecific"},"details":{"type":"string"},"id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"schema_version":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.OSV":{"description":"advisory.OSV","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_updated":{"type":"string"},"osv":{"$ref":"#/components/schemas/advisory.OSVObj"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OSVObj":{"description":"advisory.OSVObj","properties":{"affected":{"description":"collection based on https://ossf.github.io/osv-schema/","items":{"$ref":"#/components/schemas/advisory.Affected"},"type":"array","uniqueItems":false},"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"details":{"type":"string"},"id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.OSVReference"},"type":"array","uniqueItems":false},"related":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"withdrawn":{"type":"string"}},"type":"object"},"advisory.OSVPackage":{"description":"advisory.OSVPackage","properties":{"ecosystem":{"type":"string"},"name":{"type":"string"},"purl":{"type":"string"}},"type":"object"},"advisory.OSVReference":{"description":"advisory.OSVReference","properties":{"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OTRS":{"description":"advisory.OTRS","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"product":{"type":"string"},"release":{"type":"string"},"risk":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OctopusDeploy":{"description":"advisory.OctopusDeploy","properties":{"advisory_number":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Okta":{"description":"advisory.Okta","properties":{"affected_products":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"cwe":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"resolution":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Omron":{"description":"advisory.Omron","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OneE":{"description":"advisory.OneE","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OpenBSD":{"description":"advisory.OpenBSD","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"patch":{"type":"string"},"release":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OpenCVDB":{"description":"advisory.OpenCVDB","properties":{"affected_platforms":{"items":{"type":"string"},"type":"array","uniqueItems":false},"affected_services":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"disclosed_at":{"type":"string"},"known_itw_exploitation":{"type":"boolean"},"manual_remediation":{"type":"string"},"published_at":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OpenJDK":{"description":"advisory.OpenJDK","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"openjdk_cves":{"items":{"$ref":"#/components/schemas/advisory.OpenJDKCVE"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OpenJDKCVE":{"description":"advisory.OpenJDKCVE","properties":{"cve":{"type":"string"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"}},"type":"object"},"advisory.OpenSSH":{"description":"advisory.OpenSSH","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OpenSSLSecAdv":{"description":"advisory.OpenSSLSecAdv","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_updated":{"type":"string"},"description":{"type":"string"},"filename":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"url":{"type":"string"},"vulnerabilities":{"items":{"$ref":"#/components/schemas/advisory.OpenSSLVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.OpenSSLVulnerability":{"description":"advisory.OpenSSLVulnerability","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"fixed":{"items":{"$ref":"#/components/schemas/advisory.FixAff"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.OpenStack":{"description":"advisory.OpenStack","properties":{"affects":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Opengear":{"description":"advisory.Opengear","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OracleCPU":{"description":"advisory.OracleCPU","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"product":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OracleCPUCSAF":{"description":"advisory.OracleCPUCSAF","properties":{"csaf":{"$ref":"#/components/schemas/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OriginalGHSA":{"description":"advisory.OriginalGHSA","properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.GHSAAffected"},"type":"array","uniqueItems":false},"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"database_specific":{"$ref":"#/components/schemas/advisory.GHSADatabaseSpecific"},"details":{"type":"string"},"id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.GHSAReference"},"type":"array","uniqueItems":false},"schema_version":{"type":"string"},"severity":{"items":{"$ref":"#/components/schemas/advisory.GHSASeverity"},"type":"array","uniqueItems":false},"summary":{"type":"string"}},"type":"object"},"advisory.OvalCVE":{"description":"advisory.OvalCVE","properties":{"href":{"type":"string"},"id":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.OvalReference":{"description":"advisory.OvalReference","properties":{"ref_id":{"type":"string"},"ref_url":{"type":"string"},"source":{"type":"string"}},"type":"object"},"advisory.Override":{"description":"advisory.Override","properties":{"_annotation":{"$ref":"#/components/schemas/advisory.OverrideAnnotation"},"cve":{"$ref":"#/components/schemas/advisory.OverrideCVE"}},"type":"object"},"advisory.OverrideAnnotation":{"description":"advisory.OverrideAnnotation","properties":{"cve_id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"reason":{"type":"string"},"snapshot":{"type":"string"},"triage_notes":{"$ref":"#/components/schemas/advisory.TriageNotes"}},"type":"object"},"advisory.OverrideCVE":{"description":"advisory.OverrideCVE","properties":{"configurations":{"items":{"$ref":"#/components/schemas/advisory.OverrideConfiguration"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.OverrideConfiguration":{"description":"advisory.OverrideConfiguration","properties":{"nodes":{"items":{"$ref":"#/components/schemas/advisory.CPENode"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.OwnCloud":{"description":"advisory.OwnCloud","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PGFix":{"description":"advisory.PGFix","properties":{"affected":{"type":"string"},"fixed":{"type":"string"}},"type":"object"},"advisory.PHPMyAdmin":{"description":"advisory.PHPMyAdmin","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PKCert":{"description":"advisory.PKCert","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PTC":{"description":"advisory.PTC","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PTMDescriptions":{"description":"advisory.PTMDescriptions","properties":{"cweId":{"type":"string"},"description":{"type":"string"},"lang":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.Package":{"description":"advisory.Package","properties":{"filename":{"type":"string"},"name":{"description":"sort","type":"string"},"release":{"type":"string"},"src":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.PackageStat":{"description":"advisory.PackageStat","properties":{"cpe":{"type":"string"},"fix_state":{"type":"string"},"package_name":{"type":"string"},"product_name":{"type":"string"}},"type":"object"},"advisory.PacketstormExploit":{"description":"advisory.PacketstormExploit","properties":{"author":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"download_url":{"type":"string"},"md5":{"type":"string"},"summary":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Palantir":{"description":"advisory.Palantir","properties":{"affected_products":{"type":"string"},"background":{"type":"string"},"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PaloAltoAdvisory":{"description":"advisory.PaloAltoAdvisory","properties":{"affected":{"type":"string"},"applicableVersions":{"type":"string"},"attackComplexity":{"type":"string"},"attackRequirements":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"confidentialityImpact":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvssbaseScore":{"type":"string"},"datePublished":{"type":"string"},"dateUpdated":{"type":"string"},"date_added":{"type":"string"},"id":{"type":"string"},"integrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"problem":{"type":"string"},"product":{"type":"string"},"scope":{"type":"string"},"severity":{"type":"string"},"solution":{"type":"string"},"title":{"type":"string"},"unaffected":{"type":"string"},"url":{"type":"string"},"userInteraction":{"type":"string"},"workaround":{"type":"string"}},"type":"object"},"advisory.Panasonic":{"description":"advisory.Panasonic","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PaperCut":{"description":"advisory.PaperCut","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Patch":{"description":"advisory.Patch","properties":{"advisory_id":{"type":"string"},"component":{"type":"string"},"link":{"type":"string"},"os_sw":{"type":"string"}},"type":"object"},"advisory.Pega":{"description":"advisory.Pega","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"score":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PhilipsAdvisory":{"description":"advisory.PhilipsAdvisory","properties":{"affected_products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_updated":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PhoenixContactAdvisory":{"description":"advisory.PhoenixContactAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vde":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.PostgresSQL":{"description":"advisory.PostgresSQL","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"pg_fix":{"items":{"$ref":"#/components/schemas/advisory.PGFix"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PowerDNS":{"description":"advisory.PowerDNS","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PrimeVersion":{"description":"advisory.PrimeVersion","properties":{"jdK":{"type":"string"},"prime":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.Product":{"description":"advisory.Product","properties":{"name":{"type":"string"},"product_id":{"type":"string"},"product_identification_helper":{"$ref":"#/components/schemas/advisory.IdentificationHelper"}},"type":"object"},"advisory.ProductBranch":{"description":"ProductTree contains information about the product tree (branches only).\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#322-product-tree-property","properties":{"branches":{"items":{"$ref":"#/components/schemas/advisory.ProductBranch"},"type":"array","uniqueItems":false},"category":{"type":"string"},"name":{"type":"string"},"product":{"$ref":"#/components/schemas/advisory.Product"},"relationships":{"items":{"$ref":"#/components/schemas/advisory.CSAFRelationship"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.ProductSpecificDetail":{"description":"advisory.ProductSpecificDetail","properties":{"ID":{"type":"string"},"display_value":{"type":"string"}},"type":"object"},"advisory.ProductsAffected":{"description":"advisory.ProductsAffected","properties":{"cve":{"type":"string"},"description":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.Progress":{"description":"advisory.Progress","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Proofpoint":{"description":"advisory.Proofpoint","properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Publisher":{"description":"advisory.Publisher","properties":{"category":{"type":"string"},"contact_details":{"type":"string"},"issuing_authority":{"type":"string"},"name":{"type":"string"},"namespace":{"type":"string"}},"type":"object"},"advisory.PureStorage":{"description":"advisory.PureStorage","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"product":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PyPAAdvisory":{"description":"advisory.PyPAAdvisory","properties":{"advisory_id":{"description":"ID is the PYSEC- identifier","type":"string"},"affected":{"description":"Affected will list out the vulnerable versions.","items":{"$ref":"#/components/schemas/advisory.PyPAAffected"},"type":"array","uniqueItems":false},"aliases":{"description":"Aliases are other identifiers that refer to this, such as a CVE","items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"description":"Details discuss the vulnerability information","type":"string"},"modified":{"description":"Modified is non-zero Time if entry was updated","type":"string"},"published":{"description":"Published is the datetime when this was released","type":"string"},"references":{"description":"References are links to more detailed advisories, fixes, etc.","items":{"$ref":"#/components/schemas/advisory.PyPAReference"},"type":"array","uniqueItems":false},"was_withdrawn":{"description":"WasWD indicates if the advisory was withdrawn or not.","type":"boolean"},"withdrawn":{"description":"Withdrawn is non-zero if this advisory has been withdrawn","type":"string"}},"type":"object"},"advisory.PyPAAffected":{"description":"advisory.PyPAAffected","properties":{"package":{"$ref":"#/components/schemas/advisory.PyPAPackage"},"ranges":{"items":{"$ref":"#/components/schemas/advisory.PyPARange"},"type":"array","uniqueItems":false},"versions":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.PyPAEvent":{"description":"advisory.PyPAEvent","properties":{"fixed":{"type":"string"},"introduced":{"type":"string"}},"type":"object"},"advisory.PyPAPackage":{"description":"advisory.PyPAPackage","properties":{"ecosystem":{"type":"string"},"name":{"type":"string"},"purl":{"type":"string"}},"type":"object"},"advisory.PyPARange":{"description":"advisory.PyPARange","properties":{"events":{"items":{"$ref":"#/components/schemas/advisory.PyPAEvent"},"type":"array","uniqueItems":false},"ranges_type":{"type":"string"}},"type":"object"},"advisory.PyPAReference":{"description":"advisory.PyPAReference","properties":{"refs_type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.QNAPAdvisory":{"description":"advisory.QNAPAdvisory","properties":{"affected":{"type":"string"},"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"last_update_date":{"type":"string"},"link":{"type":"string"},"severity":{"type":"string"},"severity_number":{"type":"string"},"status":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.QQID":{"description":"advisory.QQID","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss3_score":{"type":"string"},"cvss_score":{"type":"string"},"date_added":{"type":"string"},"qid":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.QSB":{"description":"advisory.QSB","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Qualcomm":{"description":"advisory.Qualcomm","properties":{"chipsets":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"score":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Qualys":{"description":"advisory.Qualys","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"exploits":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.QualysQID":{"description":"advisory.QualysQID","properties":{"consequence":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_v2":{"items":{"$ref":"#/components/schemas/advisory.CvsssV2_3"},"type":"array","uniqueItems":false},"cvss_v3":{"items":{"$ref":"#/components/schemas/advisory.CvsssV2_3"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_insert":{"type":"string"},"description":{"type":"string"},"patches":{"items":{"$ref":"#/components/schemas/advisory.Patch"},"type":"array","uniqueItems":false},"published":{"type":"string"},"qid":{"type":"string"},"severity":{"type":"string"},"solution":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vendor_refs":{"items":{"$ref":"#/components/schemas/advisory.VendorRef"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.RDescription":{"description":"advisory.RDescription","properties":{"value":{"type":"string"}},"type":"object"},"advisory.RNote":{"description":"advisory.RNote","properties":{"audience":{"type":"string"},"ordinal":{"type":"string"},"text":{"type":"string"},"title":{"type":"string"},"type":{"description":"diff between xml \u0026\u0026 json","type":"integer"}},"type":"object"},"advisory.RRevision":{"description":"advisory.RRevision","properties":{"date":{"type":"string"},"description":{"$ref":"#/components/schemas/advisory.RDescription"},"number":{"type":"string"}},"type":"object"},"advisory.RScoreSet":{"description":"advisory.RScoreSet","properties":{"base_score":{"type":"string"},"product_id":{"type":"string"},"temporal_score":{"type":"string"},"vector":{"type":"string"}},"type":"object"},"advisory.RThreat":{"description":"advisory.RThreat","properties":{"Date":{"type":"string"},"DateSpecified":{"type":"boolean"},"Description":{"$ref":"#/components/schemas/advisory.IVal"},"ProductID":{"items":{"type":"string"},"type":"array","uniqueItems":false},"Type":{"description":"diff","type":"integer"}},"type":"object"},"advisory.Range":{"description":"advisory.Range","properties":{"events":{"items":{"$ref":"#/components/schemas/advisory.Event"},"type":"array","uniqueItems":false},"repo":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.RansomwareExploit":{"description":"advisory.RansomwareExploit","properties":{"associated_capecs":{"items":{"$ref":"#/components/schemas/advisory.Capec"},"type":"array","uniqueItems":false},"associated_cwes":{"items":{"$ref":"#/components/schemas/advisory.CweData"},"type":"array","uniqueItems":false},"associated_mitre_attack_techniques":{"items":{"$ref":"#/components/schemas/advisory.MitreAttackTechWithRefs"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve_references":{"items":{"$ref":"#/components/schemas/advisory.CVEReference"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"malpedia_url":{"type":"string"},"ransomware_family":{"type":"string"},"tools":{"items":{"$ref":"#/components/schemas/advisory.Tool"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.RecordType":{"description":"advisory.RecordType","properties":{"finding":{"type":"string"},"id":{"type":"string"},"kind":{"type":"string"}},"type":"object"},"advisory.RedLion":{"description":"advisory.RedLion","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RedhatCVE":{"description":"advisory.RedhatCVE","properties":{"advisories":{"items":{"type":"string"},"type":"array","uniqueItems":false},"advisory_csaf_vex_url":{"items":{"type":"string"},"type":"array","uniqueItems":false},"affected_packages":{"description":"used for un-marshlling from redhat","items":{"type":"string"},"type":"array","uniqueItems":false},"affected_release":{"items":{"$ref":"#/components/schemas/advisory.AffectedRel"},"type":"array","uniqueItems":false},"bugzilla":{"type":"string"},"bugzilla_description":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve_csaf_vex_url":{"type":"string"},"cvss3_score":{"type":"string"},"cvss3_scoring_vector":{"type":"string"},"cvss_score":{"type":"number"},"cvss_scoring_vector":{"type":"string"},"cwe":{"type":"string"},"package_state":{"items":{"$ref":"#/components/schemas/advisory.PackageStat"},"type":"array","uniqueItems":false},"packages":{"description":"used to index into vulncheck OS","items":{"$ref":"#/components/schemas/advisory.VulnCheckPackage"},"type":"array","uniqueItems":false},"public_date":{"type":"string"},"resource_url":{"type":"string"},"severity":{"type":"string"}},"type":"object"},"advisory.Reference":{"description":"advisory.Reference","properties":{"href":{"description":"sort","type":"string"},"id":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.RelatedRule":{"description":"advisory.RelatedRule","properties":{"id":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.RemediationData":{"description":"advisory.RemediationData","properties":{"category":{"type":"string"},"date":{"type":"string"},"details":{"type":"string"},"entitlements":{"items":{"type":"string"},"type":"array","uniqueItems":false},"group_ids":{"items":{"type":"string"},"type":"array","uniqueItems":false},"product_ids":{"items":{"type":"string"},"type":"array","uniqueItems":false},"restart_required":{"$ref":"#/components/schemas/advisory.RestartData"}},"type":"object"},"advisory.Renesas":{"description":"advisory.Renesas","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ReportedExploit":{"description":"advisory.ReportedExploit","properties":{"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RestartData":{"description":"advisory.RestartData","properties":{"category":{"type":"string"},"details":{"type":"string"}},"type":"object"},"advisory.RevisionHistory":{"description":"advisory.RevisionHistory","properties":{"date":{"type":"string"},"number":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.Revive":{"description":"advisory.Revive","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RhelCVE":{"description":"advisory.RhelCVE","properties":{"csaf":{"$ref":"#/components/schemas/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Roche":{"description":"advisory.Roche","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"roche_cves":{"items":{"$ref":"#/components/schemas/advisory.RocheCVE"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RocheCVE":{"description":"advisory.RocheCVE","properties":{"cve":{"type":"string"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"}},"type":"object"},"advisory.Rockwell":{"description":"advisory.Rockwell","properties":{"affected_products":{"items":{"$ref":"#/components/schemas/advisory.RockwellAffectedProduct"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"impact":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RockwellAffectedProduct":{"description":"advisory.RockwellAffectedProduct","properties":{"affectedCatalogNumber":{"type":"string"},"affectedVersion":{"type":"string"},"correctedVersion":{"type":"string"},"cve":{"type":"string"},"product":{"type":"string"}},"type":"object"},"advisory.RockyAdvisory":{"description":"advisory.RockyAdvisory","properties":{"affectedProducts":{"items":{"type":"string"},"type":"array","uniqueItems":false},"buildReferences":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cves":{"items":{"$ref":"#/components/schemas/advisory.RockyCve"},"type":"array","uniqueItems":false},"description":{"type":"string"},"fixes":{"items":{"$ref":"#/components/schemas/advisory.RockyFix"},"type":"array","uniqueItems":false},"name":{"type":"string"},"publishedAt":{"type":"string"},"rebootSuggested":{"type":"boolean"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"rpms":{"$ref":"#/components/schemas/advisory.RockyRpms"},"severity":{"type":"string"},"shortCode":{"type":"string"},"solution":{"type":"string"},"synopsis":{"type":"string"},"topic":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.RockyCve":{"description":"advisory.RockyCve","properties":{"cvss3BaseScore":{"type":"string"},"cvss3ScoringVector":{"type":"string"},"cwe":{"type":"string"},"name":{"type":"string"},"sourceBy":{"type":"string"},"sourceLink":{"type":"string"}},"type":"object"},"advisory.RockyErrata":{"description":"advisory.RockyErrata","properties":{"advisory":{"$ref":"#/components/schemas/advisory.RockyAdvisory"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"packages":{"items":{"$ref":"#/components/schemas/advisory.RockyPackage"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.RockyFix":{"description":"advisory.RockyFix","properties":{"description":{"type":"string"},"sourceBy":{"type":"string"},"sourceLink":{"type":"string"},"ticket":{"type":"string"}},"type":"object"},"advisory.RockyPackage":{"description":"advisory.RockyPackage","properties":{"distro":{"type":"string"},"name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.RockyRpms":{"additionalProperties":{"$ref":"#/components/schemas/advisory.RockyVersion"},"description":"advisory.RockyRpms","type":"object"},"advisory.RockyVersion":{"description":"advisory.RockyVersion","properties":{"nvras":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.Rsync":{"description":"advisory.Rsync","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Ruckus":{"description":"advisory.Ruckus","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RustsecAdvisory":{"description":"advisory.RustsecAdvisory","properties":{"advisory":{"$ref":"#/components/schemas/advisory.RustsecFrontMatterAdvisory"},"affected":{"$ref":"#/components/schemas/advisory.RustsecAffected"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"versions":{"$ref":"#/components/schemas/advisory.RustsecFrontMatterVersions"}},"type":"object"},"advisory.RustsecAffected":{"description":"advisory.RustsecAffected","properties":{"arch":{"items":{"type":"string"},"type":"array","uniqueItems":false},"functions":{"type":"string"},"os":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.RustsecFrontMatterAdvisory":{"description":"advisory.RustsecFrontMatterAdvisory","properties":{"aliases":{"description":"Vulnerability aliases, e.g. CVE IDs (optional but recommended)\nRequest a CVE for your RustSec vulns: https://iwantacve.org/","items":{"type":"string"},"type":"array","uniqueItems":false},"categories":{"description":"Optional: Categories this advisory falls under. Valid categories are:\n\"code-execution\", \"crypto-failure\", \"denial-of-service\", \"file-disclosure\"\n\"format-injection\", \"memory-corruption\", \"memory-exposure\", \"privilege-escalation\"","items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"description":"Optional: a Common Vulnerability Scoring System score. More information\ncan be found on the CVSS website, https://www.first.org/cvss/.","type":"string"},"date":{"description":"Disclosure date of the advisory as an RFC 3339 date (mandatory)","type":"string"},"informational":{"description":"Optional: Indicates the type of informational security advisory\n - \"unsound\" for soundness issues\n - \"unmaintained\" for crates that are no longer maintained\n - \"notice\" for other informational notices","type":"string"},"keywords":{"description":"Freeform keywords which describe this vulnerability, similar to Cargo (optional)","items":{"type":"string"},"type":"array","uniqueItems":false},"package":{"description":"Name of the affected crate (mandatory)","type":"string"},"references":{"description":"URL to additional helpful references regarding the advisory (optional)","items":{"type":"string"},"type":"array","uniqueItems":false},"related":{"description":"Related vulnerabilities (optional)\ne.g. CVE for a C library wrapped by a -sys crate)","items":{"type":"string"},"type":"array","uniqueItems":false},"rustsec_id":{"description":"Identifier for the advisory (mandatory). Will be assigned a \"RUSTSEC-YYYY-NNNN\"\nidentifier e.g. RUSTSEC-2018-0001. Please use \"RUSTSEC-0000-0000\" in PRs.","type":"string"},"url":{"description":"URL to a long-form description of this issue, e.g. a GitHub issue/PR,\na change log entry, or a blogpost announcing the release (optional)","type":"string"},"withdrawn":{"description":"Whether the advisory is withdrawn (optional)","type":"string"}},"type":"object"},"advisory.RustsecFrontMatterVersions":{"description":"advisory.RustsecFrontMatterVersions","properties":{"patched":{"items":{"type":"string"},"type":"array","uniqueItems":false},"unaffected":{"description":"Versions which were never vulnerable (optional)","items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.SAAdvisory":{"description":"advisory.SAAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"threats":{"type":"string"},"vendor":{"type":"string"},"warningDate":{"type":"string"},"warningNumber":{"type":"string"}},"type":"object"},"advisory.SAP":{"description":"advisory.SAP","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SECConsult":{"description":"advisory.SECConsult","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SSASource":{"description":"advisory.SSASource","properties":{"document":{"$ref":"#/components/schemas/advisory.SiemensDocument"},"product_tree":{"$ref":"#/components/schemas/advisory.SiemensProductTree"},"vulnerabilities":{"items":{"$ref":"#/components/schemas/advisory.SiemensVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.SSDAdvisory":{"description":"advisory.SSDAdvisory","properties":{"analysis":{"type":"string"},"credit":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"link":{"type":"string"},"poc":{"description":"contains actual poc code","type":"string"},"published":{"type":"string"},"response_ref":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.Safran":{"description":"advisory.Safran","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SaintExploit":{"description":"advisory.SaintExploit","properties":{"bid":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"osvdb":{"type":"string"},"saint_id":{"type":"string"},"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SalesForce":{"description":"advisory.SalesForce","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"integer"},"link":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.Samba":{"description":"advisory.Samba","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"issues":{"type":"string"},"patches":{"items":{"type":"string"},"type":"array","uniqueItems":false},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Sandisk":{"description":"advisory.Sandisk","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SansDshield":{"description":"advisory.SansDshield","properties":{"count":{"type":"integer"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"firstSeen":{"type":"string"},"lastSeen":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SchneiderCVE":{"description":"advisory.SchneiderCVE","properties":{"cve":{"type":"string"},"cvss_score3":{"type":"string"},"cvss_score4":{"type":"string"},"cvss_vector3":{"type":"string"},"cvss_vector4":{"type":"string"}},"type":"object"},"advisory.SchneiderElectricAdvisory":{"description":"advisory.SchneiderElectricAdvisory","properties":{"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"pdf_url":{"type":"string"},"schneider_cves":{"items":{"$ref":"#/components/schemas/advisory.SchneiderCVE"},"type":"array","uniqueItems":false},"schneider_electric_id":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Schutzwerk":{"description":"advisory.Schutzwerk","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SecFix":{"description":"advisory.SecFix","properties":{"arch":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"release":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.SecurityBulletin":{"description":"advisory.SecurityBulletin","properties":{"acknowledgement":{"type":"string"},"bulletinId":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvedetails":{"items":{"$ref":"#/components/schemas/advisory.CVEDetail"},"type":"array"},"date_added":{"type":"string"},"hardwareUpdates":{"items":{"$ref":"#/components/schemas/advisory.HardwareUpdate"},"type":"array"},"lastUpdated":{"type":"string"},"link":{"type":"string"},"revisions":{"items":{"$ref":"#/components/schemas/advisory.NvidiaRevision"},"type":"array"},"severity":{"type":"string"},"softwareUpdates":{"items":{"$ref":"#/components/schemas/advisory.SoftwareUpdate"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.SecurityLab":{"description":"advisory.SecurityLab","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"title_ru":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.SeebugExploit":{"description":"advisory.SeebugExploit","properties":{"author":{"type":"string"},"category":{"type":"string"},"cnnvd":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cnvd":{"items":{"type":"string"},"type":"array","uniqueItems":false},"component":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"find_time":{"type":"string"},"name":{"type":"string"},"ssv_id":{"type":"string"},"submitter":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Sel":{"description":"advisory.Sel","properties":{"acknowledgement":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SentinelOne":{"description":"advisory.SentinelOne","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ServiceNow":{"description":"advisory.ServiceNow","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SevenZip":{"description":"advisory.SevenZip","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Severity":{"description":"advisory.Severity","properties":{"score":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.ShadowServerExploitedVulnerability":{"description":"advisory.ShadowServerExploitedVulnerability","properties":{"cnvd":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"detections_last_1_day":{"type":"integer"},"detections_last_30_days":{"type":"integer"},"detections_last_7_days":{"type":"integer"},"detections_last_90_days":{"type":"integer"},"edb":{"type":"string"},"in_kev":{"type":"boolean"},"is_iot":{"type":"boolean"},"is_ransomware":{"type":"boolean"},"product":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"},"vulnerability_id":{"type":"string"},"vulnerability_link":{"type":"string"}},"type":"object"},"advisory.Shielder":{"description":"advisory.Shielder","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Sick":{"description":"advisory.Sick","properties":{"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"id":{"type":"string"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"}},"type":"object"},"advisory.SiemensAcknowledgments":{"description":"advisory.SiemensAcknowledgments","properties":{"names":{"items":{"type":"string"},"type":"array","uniqueItems":false},"organization":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.SiemensAdvisory":{"description":"advisory.SiemensAdvisory","properties":{"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvrf_url":{"type":"string"},"date_added":{"type":"string"},"html_url":{"type":"string"},"id":{"type":"string"},"last_update":{"description":"could potentially kill this in the future as it's a dupe","type":"string"},"pdf_url":{"type":"string"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"ssa":{"$ref":"#/components/schemas/advisory.SSASource"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"txt_url":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.SiemensBranch":{"description":"advisory.SiemensBranch","properties":{"branches":{"items":{"$ref":"#/components/schemas/advisory.SiemensSubBranch"},"type":"array","uniqueItems":false},"category":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.SiemensCVSSV3":{"description":"advisory.SiemensCVSSV3","properties":{"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.SiemensCWE":{"description":"advisory.SiemensCWE","properties":{"id":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.SiemensDistribution":{"description":"advisory.SiemensDistribution","properties":{"text":{"type":"string"},"tlp":{"$ref":"#/components/schemas/advisory.SiemensTLP"}},"type":"object"},"advisory.SiemensDocument":{"description":"advisory.SiemensDocument","properties":{"acknowledgments":{"items":{"$ref":"#/components/schemas/advisory.SiemensAcknowledgments"},"type":"array","uniqueItems":false},"category":{"type":"string"},"csaf_version":{"type":"string"},"distribution":{"$ref":"#/components/schemas/advisory.SiemensDistribution"},"notes":{"items":{"$ref":"#/components/schemas/advisory.SiemensNotes"},"type":"array","uniqueItems":false},"publisher":{"$ref":"#/components/schemas/advisory.SiemensPublisher"},"references":{"items":{"$ref":"#/components/schemas/advisory.SiemensReferences"},"type":"array","uniqueItems":false},"title":{"type":"string"},"tracking":{"$ref":"#/components/schemas/advisory.SiemensTracking"}},"type":"object"},"advisory.SiemensEngine":{"description":"advisory.SiemensEngine","properties":{"name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.SiemensGenerator":{"description":"advisory.SiemensGenerator","properties":{"engine":{"$ref":"#/components/schemas/advisory.SiemensEngine"}},"type":"object"},"advisory.SiemensNotes":{"description":"advisory.SiemensNotes","properties":{"category":{"type":"string"},"text":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.SiemensProduct":{"description":"advisory.SiemensProduct","properties":{"name":{"type":"string"},"product_id":{"type":"string"},"product_identification_helper":{"$ref":"#/components/schemas/advisory.SiemensProductIdentificationHelper"}},"type":"object"},"advisory.SiemensProductIdentificationHelper":{"description":"advisory.SiemensProductIdentificationHelper","properties":{"model_numbers":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.SiemensProductStatus":{"description":"advisory.SiemensProductStatus","properties":{"known_affected":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.SiemensProductTree":{"description":"advisory.SiemensProductTree","properties":{"branches":{"items":{"$ref":"#/components/schemas/advisory.SiemensBranch"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.SiemensPublisher":{"description":"advisory.SiemensPublisher","properties":{"category":{"type":"string"},"contact_details":{"type":"string"},"name":{"type":"string"},"namespace":{"type":"string"}},"type":"object"},"advisory.SiemensReferences":{"description":"advisory.SiemensReferences","properties":{"category":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SiemensRemediation":{"description":"advisory.SiemensRemediation","properties":{"category":{"type":"string"},"details":{"type":"string"},"product_ids":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.SiemensRevisionHistory":{"description":"advisory.SiemensRevisionHistory","properties":{"date":{"type":"string"},"legacy_version":{"type":"string"},"number":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.SiemensScore":{"description":"advisory.SiemensScore","properties":{"cvss_v3":{"$ref":"#/components/schemas/advisory.SiemensCVSSV3"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.SiemensSubBranch":{"description":"advisory.SiemensSubBranch","properties":{"branches":{"items":{"$ref":"#/components/schemas/advisory.SiemensSubSubBranch"},"type":"array","uniqueItems":false},"category":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.SiemensSubSubBranch":{"description":"advisory.SiemensSubSubBranch","properties":{"category":{"type":"string"},"name":{"type":"string"},"product":{"$ref":"#/components/schemas/advisory.SiemensProduct"}},"type":"object"},"advisory.SiemensTLP":{"description":"advisory.SiemensTLP","properties":{"label":{"type":"string"}},"type":"object"},"advisory.SiemensTracking":{"description":"advisory.SiemensTracking","properties":{"current_release_date":{"type":"string"},"generator":{"$ref":"#/components/schemas/advisory.SiemensGenerator"},"id":{"type":"string"},"initial_release_date":{"type":"string"},"revision_history":{"items":{"$ref":"#/components/schemas/advisory.SiemensRevisionHistory"},"type":"array","uniqueItems":false},"status":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.SiemensVulnerability":{"description":"advisory.SiemensVulnerability","properties":{"cve":{"type":"string"},"cwe":{"$ref":"#/components/schemas/advisory.SiemensCWE"},"notes":{"items":{"$ref":"#/components/schemas/advisory.SiemensNotes"},"type":"array","uniqueItems":false},"product_status":{"$ref":"#/components/schemas/advisory.SiemensProductStatus"},"references":{"items":{"$ref":"#/components/schemas/advisory.SiemensReferences"},"type":"array","uniqueItems":false},"remediations":{"items":{"$ref":"#/components/schemas/advisory.SiemensRemediation"},"type":"array","uniqueItems":false},"scores":{"items":{"$ref":"#/components/schemas/advisory.SiemensScore"},"type":"array","uniqueItems":false},"title":{"type":"string"}},"type":"object"},"advisory.SierraWireless":{"description":"advisory.SierraWireless","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"swid":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SigmaRule":{"description":"advisory.SigmaRule","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"mitre_attack_techniques":{"items":{"type":"string"},"type":"array","uniqueItems":false},"sigma_rule":{"$ref":"#/components/schemas/advisory.SigmaRuleRule"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SigmaRuleRule":{"description":"advisory.SigmaRuleRule","properties":{"author":{"type":"string"},"date":{"type":"string"},"description":{"type":"string"},"detection":{"additionalProperties":{},"type":"object"},"false_positives":{"items":{"type":"string"},"type":"array","uniqueItems":false},"fields":{"items":{"type":"string"},"type":"array","uniqueItems":false},"id":{"type":"string"},"level":{"type":"string"},"logsource":{"$ref":"#/components/schemas/advisory.LogSource"},"modified":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"related":{"items":{"$ref":"#/components/schemas/advisory.RelatedRule"},"type":"array","uniqueItems":false},"status":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"}},"type":"object"},"advisory.SingCert":{"description":"advisory.SingCert","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated":{"type":"string"}},"type":"object"},"advisory.Sitecore":{"description":"advisory.Sitecore","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"refs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"summary_ja":{"type":"string"},"title":{"type":"string"},"title_ja":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Slackware":{"description":"advisory.Slackware","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SoftwareUpdate":{"description":"advisory.SoftwareUpdate","properties":{"affectedVersion":{"type":"string"},"cves":{"items":{"type":"string"},"type":"array"},"operatingSystem":{"type":"string"},"softwareProduct":{"type":"string"},"updatedVersion":{"type":"string"}},"type":"object"},"advisory.SolarWindsAdvisory":{"description":"advisory.SolarWindsAdvisory","properties":{"affected_products":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"date_added":{"type":"string"},"fixed_version":{"type":"string"},"severity":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Solr":{"description":"advisory.Solr","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Sonatype":{"description":"advisory.Sonatype","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SonicWallAdvisory":{"description":"advisory.SonicWallAdvisory","properties":{"advisory_id":{"type":"string"},"affected_products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"cvss_vector":{"type":"string"},"cvss_version":{"type":"number"},"cwe":{"type":"string"},"date_added":{"type":"string"},"impact":{"type":"string"},"is_workaround_available":{"type":"boolean"},"last_updated_when":{"type":"string"},"published_when":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vuln_status":{"type":"string"},"vulnerable_products_list":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.SpacelabsHealthcareAdvisory":{"description":"advisory.SpacelabsHealthcareAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Splunk":{"description":"advisory.Splunk","properties":{"advisory_id":{"type":"string"},"affected_products":{"items":{"$ref":"#/components/schemas/advisory.SplunkProduct"},"type":"array","uniqueItems":false},"bug_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SplunkProduct":{"description":"advisory.SplunkProduct","properties":{"affected_version":{"type":"string"},"component":{"type":"string"},"fixed_version":{"type":"string"},"product":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Spring":{"description":"advisory.Spring","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Stormshield":{"description":"advisory.Stormshield","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.StrykerAdvisory":{"description":"advisory.StrykerAdvisory","properties":{"affected_components":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Sudo":{"description":"advisory.Sudo","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"type":"string"},"fix":{"type":"string"},"impact":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"workaround":{"type":"string"}},"type":"object"},"advisory.SuseSecurity":{"description":"advisory.SuseSecurity","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SwisslogHealthcareAdvisory":{"description":"advisory.SwisslogHealthcareAdvisory","properties":{"affected_components":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Symfony":{"description":"advisory.Symfony","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Synacktiv":{"description":"advisory.Synacktiv","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SyncroSoft":{"description":"advisory.SyncroSoft","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Synology":{"description":"advisory.Synology","properties":{"affected_products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"last_updated":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"status":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Syss":{"description":"advisory.Syss","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TI":{"description":"advisory.TI","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"incident_id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TPLink":{"description":"advisory.TPLink","properties":{"bulletin_id":{"type":"integer"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TWCertAdvisory":{"description":"advisory.TWCertAdvisory","properties":{"affected_cn":{"type":"string"},"affected_en":{"type":"string"},"credit_cn":{"type":"string"},"credit_en":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description_cn":{"type":"string"},"description_en":{"type":"string"},"link":{"type":"string"},"solution_cn":{"type":"string"},"solution_en":{"type":"string"},"title_cn":{"type":"string"},"title_en":{"type":"string"},"tvnid":{"type":"string"}},"type":"object"},"advisory.Tailscale":{"description":"advisory.Tailscale","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TalosAdvisory":{"description":"advisory.TalosAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"talos_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TeamViewer":{"description":"advisory.TeamViewer","properties":{"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TenableResearchAdvisory":{"description":"advisory.TenableResearchAdvisory","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Tencent":{"description":"advisory.Tencent","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary_cn":{"type":"string"},"title_cn":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Thales":{"description":"advisory.Thales","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TheMissingLink":{"description":"advisory.TheMissingLink","properties":{"affected_versions":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed_versions":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ThermoFisher":{"description":"advisory.ThermoFisher","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ThreatActorWithExternalObjects":{"description":"advisory.ThreatActorWithExternalObjects","properties":{"associated_capecs":{"items":{"$ref":"#/components/schemas/advisory.Capec"},"type":"array","uniqueItems":false},"associated_cwes":{"items":{"$ref":"#/components/schemas/advisory.CweData"},"type":"array","uniqueItems":false},"associated_mitre_attack_techniques":{"items":{"$ref":"#/components/schemas/advisory.MitreAttackTechWithRefs"},"type":"array","uniqueItems":false},"country":{"type":"string"},"cve_references":{"items":{"$ref":"#/components/schemas/advisory.CVEReference"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"malpedia_url":{"type":"string"},"misp_id":{"type":"string"},"misp_threat_actor":{"$ref":"#/components/schemas/advisory.MISPValueNoID"},"mitre_attack_group":{"$ref":"#/components/schemas/advisory.MITREAttackGroupNoID"},"mitre_group_cti":{"$ref":"#/components/schemas/advisory.MitreGroupCTI"},"mitre_id":{"type":"string"},"threat_actor_name":{"type":"string"},"tools":{"items":{"$ref":"#/components/schemas/advisory.Tool"},"type":"array","uniqueItems":false},"vendor_names_for_threat_actors":{"items":{"$ref":"#/components/schemas/advisory.VendorNameForThreatActor"},"type":"array","uniqueItems":false},"vendors_and_products_targeted":{"items":{"$ref":"#/components/schemas/advisory.VendorProduct"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.ThreatData":{"description":"advisory.ThreatData","properties":{"category":{"type":"string"},"details":{"type":"string"},"product_ids":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.Tibco":{"description":"advisory.Tibco","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"impact":{"type":"string"},"overview":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Timeline":{"description":"advisory.Timeline","properties":{"lang":{"type":"string"},"time":{"description":"FIXME: flip to time","type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.Tool":{"description":"advisory.Tool","properties":{"name":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.ToolRef"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.ToolRef":{"description":"advisory.ToolRef","properties":{"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Tracking":{"description":"advisory.Tracking","properties":{"current_release_date":{"type":"string"},"id":{"type":"string"},"initial_release_date":{"type":"string"},"revision_history":{"items":{"$ref":"#/components/schemas/advisory.RevisionHistory"},"type":"array","uniqueItems":false},"status":{"type":"string"},"version":{"description":"should match last 'number' in []RevisionHistory","type":"string"}},"type":"object"},"advisory.TrackingID":{"description":"advisory.TrackingID","properties":{"system_name":{"type":"string"},"text":{"type":"string"}},"type":"object"},"advisory.TraneTechnology":{"description":"advisory.TraneTechnology","properties":{"brand":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"product":{"type":"string"},"summary":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TrendMicro":{"description":"advisory.TrendMicro","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"scores":{"type":"string"},"severity":{"type":"string"},"solution":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TriageNotes":{"description":"advisory.TriageNotes","properties":{"references":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.Trustwave":{"description":"advisory.Trustwave","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.USD":{"description":"advisory.USD","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.USOMAdvisory":{"description":"advisory.USOMAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"effect_tr":{"type":"string"},"general_information_tr":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"solution_tr":{"type":"string"},"title_tr":{"type":"string"},"trid":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Ubiquiti":{"description":"advisory.Ubiquiti","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"links":{"items":{"type":"string"},"type":"array","uniqueItems":false},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.UbuntuCVE":{"description":"advisory.UbuntuCVE","properties":{"affected_packages":{"items":{"$ref":"#/components/schemas/advisory.AffectedUbuntuPackage"},"type":"array","uniqueItems":false},"cve":{"description":"Candidate","items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"description":"PublicDate","type":"string"},"reference_urls":{"description":"References","items":{"type":"string"},"type":"array","uniqueItems":false},"source_url":{"type":"string"},"status":{"description":"active || retired","type":"string"},"ubuntu_url":{"type":"string"},"usn":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.UbuntuPackageReleaseStatus":{"description":"advisory.UbuntuPackageReleaseStatus","properties":{"affected":{"type":"boolean"},"fixed":{"type":"boolean"},"fixed_version":{"type":"string"},"lts":{"type":"boolean"},"release":{"type":"string"},"release_long":{"type":"string"},"release_version":{"type":"string"},"status":{"type":"string"}},"type":"object"},"advisory.Unify":{"description":"advisory.Unify","properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Unisoc":{"description":"advisory.Unisoc","properties":{"access_vector":{"type":"string"},"affected_chipsets":{"type":"string"},"affected_software":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"rating":{"type":"string"},"score":{"type":"string"},"severity":{"type":"string"},"technology":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vulnerability":{"type":"string"}},"type":"object"},"advisory.Update":{"description":"advisory.Update","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"description":"sort // key","type":"string"},"issued":{"$ref":"#/components/schemas/advisory.DateTime"},"os_arch":{"type":"string"},"os_version":{"type":"string"},"packages":{"items":{"$ref":"#/components/schemas/advisory.Package"},"type":"array","uniqueItems":false},"references":{"items":{"$ref":"#/components/schemas/advisory.Reference"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"},"updated":{"$ref":"#/components/schemas/advisory.DateTime"}},"type":"object"},"advisory.Updated":{"description":"advisory.Updated","type":"object"},"advisory.V3AcceptanceLevel":{"description":"advisory.V3AcceptanceLevel","properties":{"description":{"type":"string"},"lastModified":{"type":"string"}},"type":"object"},"advisory.VCCPEDictionary":{"description":"advisory.VCCPEDictionary","properties":{"baseCPE":{"type":"string"},"versions":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.VCVulnerableCPEs":{"description":"advisory.VCVulnerableCPEs","properties":{"cve":{"type":"string"},"unrolled":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.VDEAdvisory":{"description":"advisory.VDEAdvisory","properties":{"csaf_json":{"$ref":"#/components/schemas/advisory.CSAF"},"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vde":{"type":"string"}},"type":"object"},"advisory.VLC":{"description":"advisory.VLC","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VMWareAdvisory":{"description":"advisory.VMWareAdvisory","properties":{"AdvisoryID":{"type":"string"},"AdvisoryURL":{"type":"string"},"CVSSv3Range":{"type":"string"},"IssueDate":{"type":"string"},"Severity":{"type":"string"},"Synopsis":{"type":"string"},"UpdatedOn":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.VYAIREAdvisory":{"description":"advisory.VYAIREAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VanDyke":{"description":"advisory.VanDyke","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VapidLabsAdvisory":{"description":"advisory.VapidLabsAdvisory","properties":{"author":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"exploit":{"type":"string"},"link":{"type":"string"},"title":{"type":"string"},"vapidId":{"type":"string"},"vendor":{"type":"string"},"vulnerability":{"type":"string"}},"type":"object"},"advisory.Veeam":{"description":"advisory.Veeam","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"solution":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VendorNameForThreatActor":{"description":"advisory.VendorNameForThreatActor","properties":{"threat_actor_name":{"type":"string"},"url":{"type":"string"},"vendor_name":{"type":"string"}},"type":"object"},"advisory.VendorProduct":{"description":"advisory.VendorProduct","properties":{"product":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.VendorRef":{"description":"advisory.VendorRef","properties":{"vendor_ref":{"type":"string"},"vendor_ref_url":{"type":"string"}},"type":"object"},"advisory.Veritas":{"description":"advisory.Veritas","properties":{"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Virtuozzo":{"description":"advisory.Virtuozzo","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VoidSec":{"description":"advisory.VoidSec","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VulnCheck":{"description":"advisory.VulnCheck","properties":{"affecting":{"items":{"type":"string"},"type":"array","uniqueItems":false},"credit":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"cvss_v3_vector":{"type":"string"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VulnCheckCVEListV5":{"description":"advisory.VulnCheckCVEListV5","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"mitre_ref":{"$ref":"#/components/schemas/advisory.MitreCVEListV5Ref"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VulnCheckConfig":{"description":"advisory.VulnCheckConfig","properties":{"config":{"items":{"$ref":"#/components/schemas/advisory.NVD20Configuration"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"}},"type":"object"},"advisory.VulnCheckKEV":{"description":"advisory.VulnCheckKEV","properties":{"_timestamp":{"type":"string"},"cisa_date_added":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwes":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"dueDate":{"type":"string"},"knownRansomwareCampaignUse":{"type":"string"},"product":{"type":"string"},"reported_exploited_by_vulncheck_canaries":{"type":"boolean"},"required_action":{"type":"string"},"shortDescription":{"type":"string"},"vendorProject":{"type":"string"},"vulncheck_reported_exploitation":{"items":{"$ref":"#/components/schemas/advisory.ReportedExploit"},"type":"array","uniqueItems":false},"vulncheck_xdb":{"items":{"$ref":"#/components/schemas/advisory.XDB"},"type":"array","uniqueItems":false},"vulnerabilityName":{"type":"string"}},"type":"object"},"advisory.VulnCheckPackage":{"description":"advisory.VulnCheckPackage","properties":{"arch":{"type":"string"},"distro":{"type":"string"},"filename":{"type":"string"},"md5":{"type":"string"},"name":{"type":"string"},"purl":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.VulnerableDebianPackage":{"description":"advisory.VulnerableDebianPackage","properties":{"associated_cves":{"items":{"$ref":"#/components/schemas/advisory.DebianCVE"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"package_name":{"type":"string"}},"type":"object"},"advisory.VulnerableProduct":{"description":"advisory.VulnerableProduct","properties":{"name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Vulnrichment":{"description":"advisory.Vulnrichment","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"mitre_ref":{"$ref":"#/components/schemas/advisory.VulnrichmentCVERef"},"url":{"type":"string"}},"type":"object"},"advisory.VulnrichmentCVERef":{"description":"advisory.VulnrichmentCVERef","properties":{"containers":{"$ref":"#/components/schemas/advisory.VulnrichmentContainers"},"cveMetadata":{"$ref":"#/components/schemas/advisory.MCveMetadata"},"dataType":{"type":"string"},"dataVersion":{"type":"string"}},"type":"object"},"advisory.VulnrichmentContainers":{"description":"advisory.VulnrichmentContainers","properties":{"adp":{"items":{"$ref":"#/components/schemas/advisory.ADP"},"type":"array","uniqueItems":false},"cna":{"$ref":"#/components/schemas/advisory.MCna"}},"type":"object"},"advisory.VulnrichmentContent":{"description":"advisory.VulnrichmentContent","properties":{"id":{"type":"string"},"options":{"items":{"$ref":"#/components/schemas/advisory.VulnrichmentOption"},"type":"array","uniqueItems":false},"role":{"type":"string"},"timestamp":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.VulnrichmentMetric":{"description":"advisory.VulnrichmentMetric","properties":{"other":{"$ref":"#/components/schemas/advisory.VulnrichmentOther"}},"type":"object"},"advisory.VulnrichmentOption":{"description":"advisory.VulnrichmentOption","properties":{"Automatable":{"type":"string"},"Exploitation":{"type":"string"},"Technical Impact":{"type":"string"}},"type":"object"},"advisory.VulnrichmentOther":{"description":"advisory.VulnrichmentOther","properties":{"content":{"$ref":"#/components/schemas/advisory.VulnrichmentContent"},"type":{"type":"string"}},"type":"object"},"advisory.WRT":{"description":"advisory.WRT","properties":{"advisory":{"type":"string"},"affectedVersions":{"type":"string"},"credits":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"mitigations":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"requirements":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.WatchGuard":{"description":"advisory.WatchGuard","properties":{"advisory_id":{"type":"string"},"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"resolution":{"type":"string"},"score":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.WhatsApp":{"description":"advisory.WhatsApp","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Wibu":{"description":"advisory.Wibu","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Wireshark":{"description":"advisory.Wireshark","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.WithSecure":{"description":"advisory.WithSecure","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.WolfSSL":{"description":"advisory.WolfSSL","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"fixed_version":{"type":"string"},"severity":{"type":"string"}},"type":"object"},"advisory.Wolfi":{"description":"advisory.Wolfi","properties":{"apkurl":{"type":"string"},"archs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"description":"un-used","type":"string"},"packages":{"items":{"$ref":"#/components/schemas/advisory.WolfiPackage"},"type":"array","uniqueItems":false},"reponame":{"type":"string"},"urlprefix":{"type":"string"}},"type":"object"},"advisory.WolfiPackage":{"description":"advisory.WolfiPackage","properties":{"name":{"type":"string"},"secfixes":{"items":{"$ref":"#/components/schemas/advisory.WolfiSecFix"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.WolfiSecFix":{"description":"advisory.WolfiSecFix","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"version":{"type":"string"}},"type":"object"},"advisory.Wordfence":{"description":"advisory.Wordfence","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.XDB":{"description":"advisory.XDB","properties":{"clone_ssh_url":{"type":"string"},"date_added":{"type":"string"},"exploit_type":{"type":"string"},"xdb_id":{"type":"string"},"xdb_url":{"type":"string"}},"type":"object"},"advisory.Xen":{"description":"advisory.Xen","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updatedAt":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Xerox":{"description":"advisory.Xerox","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Xiaomi":{"description":"advisory.Xiaomi","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"internal_id":{"type":"string"},"summary":{"type":"string"},"summary_cn":{"type":"string"},"title":{"type":"string"},"title_cn":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Xylem":{"description":"advisory.Xylem","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"xsa":{"type":"string"}},"type":"object"},"advisory.Yamaha":{"description":"advisory.Yamaha","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary_ja":{"type":"string"},"title_ja":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.YokogawaAdvisory":{"description":"advisory.YokogawaAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"name":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"ysar_id":{"type":"string"}},"type":"object"},"advisory.Yubico":{"description":"advisory.Yubico","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ZDI":{"description":"advisory.ZDI","properties":{"cves":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"cvss_version":{"type":"string"},"discoverers":{"items":{"type":"string"},"type":"array","uniqueItems":false},"filter_ids_dv":{"items":{"type":"string"},"type":"array","uniqueItems":false},"last_updated_at":{"type":"string"},"products":{"items":{"$ref":"#/components/schemas/advisory.ZDIProduct"},"type":"array","uniqueItems":false},"public_advisory":{"type":"string"},"published_date":{"type":"string"},"responses":{"items":{"$ref":"#/components/schemas/advisory.ZDIResponse"},"type":"array","uniqueItems":false},"title":{"type":"string"},"zdi_can":{"type":"string"},"zdi_public":{"type":"string"}},"type":"object"},"advisory.ZDIProduct":{"description":"advisory.ZDIProduct","properties":{"name":{"type":"string"},"uri":{"type":"string"},"vendor":{"$ref":"#/components/schemas/advisory.ZDIVendor"}},"type":"object"},"advisory.ZDIResponse":{"description":"advisory.ZDIResponse","properties":{"text":{"type":"string"},"uri":{"type":"string"},"vendor":{"$ref":"#/components/schemas/advisory.ZDIResponseVendor"}},"type":"object"},"advisory.ZDIResponseVendor":{"description":"advisory.ZDIResponseVendor","properties":{"name":{"type":"string"}},"type":"object"},"advisory.ZDIVendor":{"description":"advisory.ZDIVendor","properties":{"name":{"type":"string"},"uri":{"type":"string"}},"type":"object"},"advisory.Zebra":{"description":"advisory.Zebra","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ZeroDayAdvisory":{"description":"advisory.ZeroDayAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"zdi":{"$ref":"#/components/schemas/advisory.ZDI"}},"type":"object"},"advisory.ZeroScienceAdvisory":{"description":"advisory.ZeroScienceAdvisory","properties":{"advisoryId":{"type":"string"},"affectedVersions":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"impact":{"type":"string"},"link":{"type":"string"},"poC":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"risk":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.Zimbra":{"description":"advisory.Zimbra","properties":{"bugs":{"items":{"type":"integer"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"fix":{"type":"string"},"rating":{"type":"string"},"reporter":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.Zoom":{"description":"advisory.Zoom","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"zsb":{"type":"string"}},"type":"object"},"advisory.Zscaler":{"description":"advisory.Zscaler","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ZuluVersion":{"description":"advisory.ZuluVersion","properties":{"jdk":{"type":"string"},"type":{"type":"string"},"zulu":{"type":"string"}},"type":"object"},"advisory.Zuso":{"description":"advisory.Zuso","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"zaid":{"type":"string"}},"type":"object"},"advisory.Zyxel":{"description":"advisory.Zyxel","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.BaseMetricV2":{"description":"api.BaseMetricV2","properties":{"acInsufInfo":{"type":"boolean"},"cvssV2":{"$ref":"#/components/schemas/api.CVSSV2"},"exploitabilityScore":{"type":"number"},"impactScore":{"type":"number"},"obtainAllPrivilege":{"type":"boolean"},"obtainOtherPrivilege":{"type":"boolean"},"obtainUserPrivilege":{"type":"boolean"},"severity":{"type":"string"},"userInteractionRequired":{"type":"boolean"}},"type":"object"},"api.BaseMetricV3":{"description":"api.BaseMetricV3","properties":{"cvssV3":{"$ref":"#/components/schemas/api.CVSSV3"},"exploitabilityScore":{"type":"number"},"impactScore":{"type":"number"}},"type":"object"},"api.CPE":{"description":"api.CPE","properties":{"edition":{"type":"string"},"language":{"type":"string"},"other":{"type":"string"},"part":{"type":"string"},"product":{"type":"string"},"sw_edition":{"type":"string"},"target_hw":{"type":"string"},"target_sw":{"type":"string"},"update":{"type":"string"},"vendor":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.CPEMatch":{"description":"api.CPEMatch","properties":{"cpe22Uri":{"type":"string"},"cpe23Uri":{"type":"string"},"cpe_name":{"items":{"$ref":"#/components/schemas/api.CPEName"},"type":"array","uniqueItems":false},"versionEndExcluding":{"type":"string"},"versionEndIncluding":{"type":"string"},"versionStartExcluding":{"type":"string"},"versionStartIncluding":{"type":"string"},"vulnerable":{"type":"boolean"}},"type":"object"},"api.CPEName":{"description":"api.CPEName","properties":{"cpe22Uri":{"type":"string"},"cpe23Uri":{"type":"string"},"lastModifiedDate":{"type":"string"}},"type":"object"},"api.CVE":{"description":"api.CVE","properties":{"CVE_data_meta":{"$ref":"#/components/schemas/api.CVEDataMeta"},"data_format":{"type":"string"},"data_type":{"type":"string"},"data_version":{"type":"string"},"description":{"$ref":"#/components/schemas/api.Description"},"problemtype":{"$ref":"#/components/schemas/api.ProblemType"},"references":{"$ref":"#/components/schemas/api.References"}},"type":"object"},"api.CVEDataMeta":{"description":"api.CVEDataMeta","properties":{"ASSIGNER":{"type":"string"},"ID":{"type":"string"}},"type":"object"},"api.CVEDataMetaExtended":{"description":"api.CVEDataMetaExtended","properties":{"ALIAS":{"type":"string"},"ASSIGNER":{"type":"string"},"ID":{"type":"string"},"STATUS":{"type":"string"}},"type":"object"},"api.CVEExtended":{"description":"api.CVEExtended","properties":{"CVE_data_meta":{"$ref":"#/components/schemas/api.CVEDataMetaExtended"},"categorization":{"$ref":"#/components/schemas/api.CategorizationExtended"},"data_format":{"type":"string"},"data_type":{"type":"string"},"data_version":{"type":"string"},"description":{"$ref":"#/components/schemas/api.Description"},"problemtype":{"$ref":"#/components/schemas/api.ProblemTypeExtended"},"references":{"$ref":"#/components/schemas/api.ReferencesExtended"}},"type":"object"},"api.CVSSV2":{"description":"api.CVSSV2","properties":{"accessComplexity":{"type":"string"},"accessVector":{"type":"string"},"authentication":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.CVSSV3":{"description":"api.CVSSV3","properties":{"attackComplexity":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"scope":{"type":"string"},"userInteraction":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.CWE":{"description":"api.CWE","properties":{"abstraction":{"type":"string"},"description":{"type":"string"},"kev_count":{"type":"integer"},"status":{"type":"string"},"structure":{"type":"string"},"vulncheck_nvd_count":{"type":"integer"},"weakness_id":{"type":"string"},"weakness_name":{"type":"string"},"weighted_score":{"type":"number"}},"type":"object"},"api.CategorizationExtended":{"description":"api.CategorizationExtended","properties":{"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"api.ClientFingerprints":{"description":"api.ClientFingerprints","properties":{"hassh":{"type":"string"},"ja3":{"type":"string"},"ja4":{"type":"string"}},"type":"object"},"api.Configurations":{"description":"api.Configurations","properties":{"CVE_data_version":{"type":"string"},"nodes":{"items":{"$ref":"#/components/schemas/api.Nodes"},"type":"array","uniqueItems":false}},"type":"object"},"api.CveItems":{"description":"api.CveItems","properties":{"configurations":{"$ref":"#/components/schemas/api.Configurations"},"cve":{"$ref":"#/components/schemas/api.CVE"},"impact":{"$ref":"#/components/schemas/api.Impact"},"lastModifiedDate":{"type":"string"},"publishedDate":{"type":"string"},"vcConfigurations":{"$ref":"#/components/schemas/api.Configurations"},"vcVulnerableCPEs":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"api.CveItemsExtended":{"description":"api.CveItemsExtended","properties":{"_timestamp":{"type":"string"},"configurations":{"$ref":"#/components/schemas/api.Configurations"},"cve":{"$ref":"#/components/schemas/api.CVEExtended"},"date_added":{"type":"string"},"documentGenerationDate":{"description":"the deep tag instructs deep.Equal to ignore this field (used during OpenSearch loading)","type":"string"},"impact":{"$ref":"#/components/schemas/api.ImpactExtended"},"lastModifiedDate":{"type":"string"},"mitre_attack_techniques":{"items":{"$ref":"#/components/schemas/api.MitreAttackTech"},"type":"array","uniqueItems":false},"publishedDate":{"type":"string"},"related_attack_patterns":{"items":{"$ref":"#/components/schemas/api.RelatedAttackPattern"},"type":"array","uniqueItems":false},"vcConfigurations":{"$ref":"#/components/schemas/api.Configurations"},"vcVulnerableCPEs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"vulnerable_cpes":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"api.DateTime":{"description":"api.DateTime","type":"object"},"api.Description":{"description":"api.Description","properties":{"description_data":{"items":{"$ref":"#/components/schemas/api.DescriptionData"},"type":"array","uniqueItems":false}},"type":"object"},"api.DescriptionData":{"description":"api.DescriptionData","properties":{"lang":{"type":"string"},"value":{"type":"string"}},"type":"object"},"api.EPSS":{"description":"exclude EPSS from changelog","properties":{"epss_percentile":{"type":"number"},"epss_score":{"type":"number"},"last_modified":{"type":"string"}},"type":"object"},"api.EPSSData":{"description":"api.EPSSData","properties":{"_timestamp":{"type":"string"},"cve":{"type":"string"},"epss_percentile":{"type":"number"},"epss_score":{"type":"number"}},"type":"object"},"api.ExploitChain":{"description":"api.ExploitChain","properties":{"cves":{"items":{"$ref":"#/components/schemas/api.ExploitChainCVE"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.ExploitChainCVE":{"description":"api.ExploitChainCVE","properties":{"cve":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.ExploitV3Result":{"description":"api.ExploitV3Result","properties":{"_timestamp":{"description":"ignore this field when checking for differences/changes","type":"string"},"commercial_exploit_found":{"type":"boolean"},"counts":{"$ref":"#/components/schemas/api.ExploitsV3Count"},"date_added":{"type":"string"},"epss":{"$ref":"#/components/schemas/api.EPSS"},"exploits":{"items":{"$ref":"#/components/schemas/api.NormalizedExploitV3Entry"},"type":"array","uniqueItems":false},"id":{"type":"string"},"inKEV":{"type":"boolean"},"inVCKEV":{"type":"boolean"},"max_exploit_maturity":{"type":"string"},"public_exploit_found":{"type":"boolean"},"reported_exploitation":{"items":{"$ref":"#/components/schemas/api.NormalizedReportV3Entry"},"type":"array","uniqueItems":false},"reported_exploited":{"type":"boolean"},"reported_exploited_by_botnets":{"type":"boolean"},"reported_exploited_by_honeypot_service":{"type":"boolean"},"reported_exploited_by_ransomware":{"type":"boolean"},"reported_exploited_by_threat_actors":{"type":"boolean"},"reported_exploited_by_vulncheck_canaries":{"type":"boolean"},"timeline":{"$ref":"#/components/schemas/api.ExploitsV3Timeline"},"trending":{"$ref":"#/components/schemas/api.ExploitsTrending"},"weaponized_exploit_found":{"type":"boolean"}},"type":"object"},"api.ExploitsChange":{"description":"api.ExploitsChange","properties":{"change_time":{"type":"string"},"change_type":{"type":"string"},"field":{"type":"string"},"new_value":{},"old_value":{}},"type":"object"},"api.ExploitsChangelog":{"description":"api.ExploitsChangelog","properties":{"changes":{"items":{"$ref":"#/components/schemas/api.ExploitsChange"},"type":"array","uniqueItems":false},"cve":{"type":"string"}},"type":"object"},"api.ExploitsTrending":{"description":"api.ExploitsTrending","properties":{"github":{"type":"boolean"}},"type":"object"},"api.ExploitsV3Count":{"description":"api.ExploitsV3Count","properties":{"botnets":{"type":"integer"},"exploits":{"type":"integer"},"ransomware_families":{"type":"integer"},"threat_actors":{"type":"integer"}},"type":"object"},"api.ExploitsV3Timeline":{"description":"api.ExploitsV3Timeline","properties":{"cisa_kev_date_added":{"type":"string"},"cisa_kev_date_due":{"type":"string"},"first_exploit_published":{"type":"string"},"first_exploit_published_weaponized_or_higher":{"type":"string"},"first_reported_botnet":{"type":"string"},"first_reported_ransomware":{"type":"string"},"first_reported_threat_actor":{"type":"string"},"most_recent_exploit_published":{"type":"string"},"most_recent_reported_botnet":{"type":"string"},"most_recent_reported_ransomware":{"type":"string"},"most_recent_reported_threat_actor":{"type":"string"},"nvd_last_modified":{"description":"it's often the case the nvd record was updated, but in a way that is irrelevant to the contents\nof a vc exploits record.","type":"string"},"nvd_published":{"type":"string"},"vulncheck_kev_date_added":{"type":"string"},"vulncheck_kev_date_due":{"type":"string"}},"type":"object"},"api.HTTPDetails":{"description":"api.HTTPDetails","properties":{"http_request_body":{"type":"string"},"http_user_agent":{"type":"string"},"method":{"type":"string"},"protocol":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.Impact":{"description":"api.Impact","properties":{"baseMetricV2":{"$ref":"#/components/schemas/api.BaseMetricV2"},"baseMetricV3":{"$ref":"#/components/schemas/api.BaseMetricV3"},"metricV40":{"$ref":"#/components/schemas/advisory.CVSSV40"}},"type":"object"},"api.ImpactExtended":{"description":"api.ImpactExtended","properties":{"baseMetricV2":{"$ref":"#/components/schemas/api.BaseMetricV2"},"baseMetricV3":{"$ref":"#/components/schemas/api.BaseMetricV3"},"correctedBaseMetricV3":{"$ref":"#/components/schemas/api.BaseMetricV3"},"epss":{"$ref":"#/components/schemas/api.EPSS"},"metricV40":{"$ref":"#/components/schemas/advisory.CVSSV40"},"ssvc":{"items":{"$ref":"#/components/schemas/api.SSVC"},"type":"array","uniqueItems":false},"temporalMetricV2":{"$ref":"#/components/schemas/api.TemporalMetricV2"},"temporalMetricV3":{"$ref":"#/components/schemas/api.TemporalMetricV3"},"temporalV3Corrected":{"$ref":"#/components/schemas/api.TemporalMetricV3"},"threatMetricV40":{"$ref":"#/components/schemas/advisory.CVSSV40Threat"}},"type":"object"},"api.InitialAccess":{"description":"api.InitialAccess","properties":{"artifacts":{"description":"Artifacts holds the set of available artifacts for this vulnerability, such as exploit, shodan queries, PCAP traces, and others.","items":{"$ref":"#/components/schemas/api.InitialAccessArtifact"},"type":"array","uniqueItems":false},"cve":{"description":"CVE identifier for the given initial access record.","type":"string"},"inKEV":{"description":"InKEV is true if this artifact is in CISA's Known Exploited Vulnerabilities (KEV) data set; otherwise, false.","type":"boolean"},"inVCKEV":{"description":"InVCKEV is true if this artifact is in VulnCheck's Known Exploited Vulnerabilities (VCKEV) data set; otherwise, false.","type":"boolean"},"vulnerable_cpes":{"description":"VulnerableCPEs is the list of vulnerable CPE strings associated with this CVE and artifact(s).","items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"api.InitialAccessArtifact":{"description":"api.InitialAccessArtifact","properties":{"artifactName":{"description":"ArtifactName is a title to associate with this artifact.","type":"string"},"artifactsURL":{"description":"ArtifactsURL are URLs to the available artifact.","items":{"type":"string"},"type":"array","uniqueItems":false},"baiduQueries":{"description":"...","items":{"type":"string"},"type":"array","uniqueItems":false},"baiduRawQueries":{"description":"...","items":{"type":"string"},"type":"array","uniqueItems":false},"censysLegacyQueries":{"description":"CensysLegacyQueries are legacy queries for examining potential Internet-exposed devices \u0026 applications with Censys in URL form.","items":{"type":"string"},"type":"array","uniqueItems":false},"censysLegacyRawQueries":{"description":"CensysLegacyRawQueries are raw legacy queries for examining potential Internet-exposed devices \u0026 applications with Censys.","items":{"type":"string"},"type":"array","uniqueItems":false},"censysQueries":{"description":"CensysQueries are queries for examining potential Internet-exposed devices \u0026 applications with Censys in URL form.","items":{"type":"string"},"type":"array","uniqueItems":false},"censysRawQueries":{"description":"CensysRawQueries are raw queries for examining potential Internet-exposed devices \u0026 applications with Censys.","items":{"type":"string"},"type":"array","uniqueItems":false},"chain":{"description":"Chain can represent the chain of exploitation.","items":{"type":"string"},"type":"array","uniqueItems":false},"cloneSSHURL":{"description":"CloneSSHURL is the git URL to clone the artifact with.","type":"string"},"dateAdded":{"description":"DateAdded is when this artifact entry was first added to the InitialAccess data set.","type":"string"},"driftnetQueries":{"description":"DriftnetQueries are queries for examining Internet exposed services with Driftnet.","items":{"type":"string"},"type":"array","uniqueItems":false},"driftnetRawQueries":{"description":"DriftnetRawQueries are queries for examining Internet exposed services with Driftnet.","items":{"type":"string"},"type":"array","uniqueItems":false},"exploit":{"description":"Exploit indicates whether or not an exploit is available in this artifact.","type":"boolean"},"fofaQueries":{"description":"FOFAQueries are raw queries for examining potential Internet-exposed devices \u0026 applications with FOFA.","items":{"type":"string"},"type":"array","uniqueItems":false},"fofaRawQueries":{"items":{"type":"string"},"type":"array","uniqueItems":false},"googleQueries":{"description":"google queries","items":{"type":"string"},"type":"array","uniqueItems":false},"googleRawQueries":{"description":"raw google queries","items":{"type":"string"},"type":"array","uniqueItems":false},"greynoiseQueries":{"description":"GreynoiseQueries are queries for finding the vulnerability via honeypot data.","items":{"type":"string"},"type":"array","uniqueItems":false},"mitreAttackTechniques":{"description":"MITRE ATT\u0026CK techniques","items":{"type":"string"},"type":"array","uniqueItems":false},"nmapScript":{"description":"NmapScript indicates whether or not an nmap script for scanning environment exists in this artifact.","type":"boolean"},"pcap":{"description":"PCAP indicates whether of not a package capture of the exploit PoC exploiting a vulnerable system exists in this artifact.","type":"boolean"},"product":{"description":"Product are the software that has the vulnerability.","items":{"type":"string"},"type":"array","uniqueItems":false},"related":{"description":"Related is a set of related cves.","items":{"type":"string"},"type":"array","uniqueItems":false},"shodanQueries":{"description":"ShodanQueries are queries for examining potential Internet-exposed devices \u0026 applications with Shodan in URL form.","items":{"type":"string"},"type":"array","uniqueItems":false},"shodanRawQueries":{"description":"ShodanRawQueries are raw queries for examining potential Internet-exposed devices \u0026 applications with Shodan.","items":{"type":"string"},"type":"array","uniqueItems":false},"sigmaRule":{"description":"SigmaRule indicates whether or not a Sigma rule designed to detect the exploitation of the vulnerability over the network exists in this artifact.","type":"boolean"},"snortRule":{"description":"SnortRule indicates whether or not a Snort rule designed to detect the exploitation of the vulnerability over the network exists in this artifact.","type":"boolean"},"suricataRule":{"description":"SuricataRule indicates whether or not a Suricata rule designed to detect the exploitation of the vulnerability over the network exists in this artifact.","type":"boolean"},"targetDocker":{"description":"TargetDocker indicates whether or not there is an available docker image with the vulnerability.","type":"boolean"},"targetEncryptedComms":{"description":"Encrypted communications?","type":"string"},"targetService":{"description":"TargetService indicates the service (HTTP, FTP, etc) that this exploit targets.","type":"string"},"vendor":{"description":"Vendor of the vulnerable product","type":"string"},"versionScanner":{"description":"VersionScanner indicates whether or not the exploit PoC can determine if target system is vulnerable without sending exploit payload in this artifact.","type":"boolean"},"yara":{"description":"YARA indicates whether or not a YARA rule designed to detect the exploit on an endpoint exists in this artifact.","type":"boolean"},"zeroday":{"description":"Zeroday indicates whether or not it is a VulnCheck zeroday.","type":"boolean"},"zoomEyeQueries":{"description":"ZoomEyeQueries are raw queries for examining potential Internet-exposed devices \u0026 applications with ZoomEye.","items":{"type":"string"},"type":"array","uniqueItems":false},"zoomEyeRawQueries":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"api.MitreAttackTech":{"description":"api.MitreAttackTech","properties":{"d3fendmapping":{"items":{"$ref":"#/components/schemas/api.MitreMitigation2D3fendMapping"},"type":"array","uniqueItems":false},"detections":{"items":{"$ref":"#/components/schemas/api.MitreDetectionTech"},"type":"array","uniqueItems":false},"domain":{"type":"string"},"id":{"type":"string"},"mitigations":{"items":{"$ref":"#/components/schemas/api.MitreMitigationTech"},"type":"array","uniqueItems":false},"name":{"type":"string"},"subtechnique":{"type":"boolean"},"tactics":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"api.MitreAttackToCVE":{"description":"api.MitreAttackToCVE","properties":{"cve_list":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"technique_id":{"$ref":"#/components/schemas/api.MitreAttackTech"}},"type":"object"},"api.MitreD3fendTechnique":{"description":"api.MitreD3fendTechnique","properties":{"id":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.MitreDetectionTech":{"description":"api.MitreDetectionTech","properties":{"datacomponent":{"type":"string"},"datasource":{"type":"string"},"detects":{"type":"string"},"id":{"type":"string"}},"type":"object"},"api.MitreMitigation2D3fendMapping":{"description":"api.MitreMitigation2D3fendMapping","properties":{"d3fendtechniques":{"items":{"$ref":"#/components/schemas/api.MitreD3fendTechnique"},"type":"array","uniqueItems":false},"id":{"type":"string"}},"type":"object"},"api.MitreMitigationTech":{"description":"api.MitreMitigationTech","properties":{"description":{"type":"string"},"id":{"type":"string"},"mitigation_url":{"type":"string"}},"type":"object"},"api.NVD20CPEMatch":{"description":"api.NVD20CPEMatch","properties":{"cpeLastModified":{"type":"string"},"created":{"type":"string"},"criteria":{"type":"string"},"lastModified":{"type":"string"},"matchCriteriaId":{"type":"string"},"matches":{"items":{"$ref":"#/components/schemas/api.NVD20CPEName"},"type":"array","uniqueItems":false},"status":{"type":"string"},"versionEndExcluding":{"type":"string"},"versionEndIncluding":{"type":"string"},"versionStartExcluding":{"type":"string"},"versionStartIncluding":{"type":"string"}},"type":"object"},"api.NVD20CPEName":{"description":"api.NVD20CPEName","properties":{"cpeName":{"type":"string"},"cpeNameId":{"type":"string"}},"type":"object"},"api.NVD20CVE":{"description":"api.NVD20CVE","properties":{"cisaActionDue":{"type":"string"},"cisaExploitAdd":{"type":"string"},"cisaRequiredAction":{"type":"string"},"cisaVulnerabilityName":{"type":"string"},"configurations":{"items":{"$ref":"#/components/schemas/advisory.NVD20Configuration"},"type":"array","uniqueItems":false},"descriptions":{"items":{"$ref":"#/components/schemas/api.NVD20Description"},"type":"array","uniqueItems":false},"evaluatorComment":{"type":"string"},"evaluatorImpact":{"type":"string"},"evaluatorSolution":{"type":"string"},"id":{"type":"string"},"lastModified":{"type":"string"},"metrics":{"$ref":"#/components/schemas/api.NVD20Metric"},"published":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/api.NVD20Reference"},"type":"array","uniqueItems":false},"sourceIdentifier":{"type":"string"},"vcConfigurations":{"items":{"$ref":"#/components/schemas/advisory.NVD20Configuration"},"type":"array","uniqueItems":false},"vcVulnerableCPEs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"vendorComments":{"items":{"$ref":"#/components/schemas/api.NVD20VendorComment"},"type":"array","uniqueItems":false},"vulnStatus":{"type":"string"},"weaknesses":{"items":{"$ref":"#/components/schemas/api.NVD20Weakness"},"type":"array","uniqueItems":false}},"type":"object"},"api.NVD20CVEExtended":{"description":"api.NVD20CVEExtended","properties":{"ALIAS":{"type":"string"},"STATUS":{"type":"string"},"_timestamp":{"description":"the deep tag instructs deep.Equal to ignore this field (used during OpenSearch loading)","type":"string"},"categorization":{"$ref":"#/components/schemas/api.CategorizationExtended"},"cisaActionDue":{"type":"string"},"cisaExploitAdd":{"type":"string"},"cisaRequiredAction":{"type":"string"},"cisaVulnerabilityName":{"type":"string"},"configurations":{"items":{"$ref":"#/components/schemas/advisory.NVD20Configuration"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"descriptions":{"items":{"$ref":"#/components/schemas/api.NVD20Description"},"type":"array","uniqueItems":false},"documentGenerationDate":{"type":"string"},"evaluatorComment":{"type":"string"},"evaluatorImpact":{"type":"string"},"evaluatorSolution":{"type":"string"},"id":{"type":"string"},"lastModified":{"type":"string"},"metrics":{"$ref":"#/components/schemas/api.NVD20MetricExtended"},"mitreAttackTechniques":{"items":{"$ref":"#/components/schemas/api.MitreAttackTech"},"type":"array","uniqueItems":false},"published":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/api.NVD20ReferenceExtended"},"type":"array","uniqueItems":false},"relatedAttackPatterns":{"items":{"$ref":"#/components/schemas/api.RelatedAttackPattern"},"type":"array","uniqueItems":false},"sourceIdentifier":{"type":"string"},"vcConfigurations":{"items":{"$ref":"#/components/schemas/advisory.NVD20Configuration"},"type":"array","uniqueItems":false},"vcVulnerableCPEs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"vendorComments":{"items":{"$ref":"#/components/schemas/api.NVD20VendorComment"},"type":"array","uniqueItems":false},"vulnStatus":{"type":"string"},"vulncheckKEVExploitAdd":{"type":"string"},"vulnerableCPEs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"weaknesses":{"items":{"$ref":"#/components/schemas/api.NVD20WeaknessExtended"},"type":"array","uniqueItems":false}},"type":"object"},"api.NVD20CvssDataV2":{"description":"api.NVD20CvssDataV2","properties":{"accessComplexity":{"type":"string"},"accessVector":{"type":"string"},"authentication":{"type":"string"},"availabilityImpact":{"type":"string"},"availabilityRequirement":{"type":"string"},"baseScore":{"type":"number"},"collateralDamagePotential":{"type":"string"},"confidentialityImpact":{"type":"string"},"confidentialityRequirement":{"type":"string"},"environmentalScore":{"type":"number"},"exploitability":{"type":"string"},"integrityImpact":{"type":"string"},"integrityRequirement":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"targetDistribution":{"type":"string"},"temporalScore":{"type":"number"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.NVD20CvssDataV3":{"description":"api.NVD20CvssDataV3","properties":{"attackComplexity":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"availabilityRequirement":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityImpact":{"type":"string"},"confidentialityRequirement":{"type":"string"},"environmentalScore":{"type":"number"},"environmentalSeverity":{"type":"string"},"exploitCodeMaturity":{"type":"string"},"integrityImpact":{"type":"string"},"integrityRequirement":{"type":"string"},"modifiedAttackComplexity":{"type":"string"},"modifiedAttackVector":{"type":"string"},"modifiedAvailabilityImpact":{"type":"string"},"modifiedConfidentialityImpact":{"type":"string"},"modifiedIntegrityImpact":{"type":"string"},"modifiedPrivilegesRequired":{"type":"string"},"modifiedScope":{"type":"string"},"modifiedUserInteraction":{"type":"string"},"privilegesRequired":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"scope":{"type":"string"},"temporalScore":{"type":"number"},"temporalSeverity":{"type":"string"},"userInteraction":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.NVD20CvssMetricV2":{"description":"api.NVD20CvssMetricV2","properties":{"acInsufInfo":{"type":"boolean"},"baseSeverity":{"type":"string"},"cvssData":{"$ref":"#/components/schemas/api.NVD20CvssDataV2"},"exploitabilityScore":{"type":"number"},"impactScore":{"type":"number"},"obtainAllPrivilege":{"type":"boolean"},"obtainOtherPrivilege":{"type":"boolean"},"obtainUserPrivilege":{"type":"boolean"},"source":{"type":"string"},"type":{"type":"string"},"userInteractionRequired":{"type":"boolean"}},"type":"object"},"api.NVD20CvssMetricV3":{"description":"api.NVD20CvssMetricV3","properties":{"cvssData":{"$ref":"#/components/schemas/api.NVD20CvssDataV3"},"exploitabilityScore":{"type":"number"},"impactScore":{"type":"number"},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.NVD20CvssMetricV40":{"description":"api.NVD20CvssMetricV40","properties":{"cvssData":{"$ref":"#/components/schemas/advisory.CVSSV40"},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.NVD20Description":{"description":"api.NVD20Description","properties":{"lang":{"type":"string"},"value":{"type":"string"}},"type":"object"},"api.NVD20Metric":{"description":"api.NVD20Metric","properties":{"cvssMetricV2":{"items":{"$ref":"#/components/schemas/api.NVD20CvssMetricV2"},"type":"array","uniqueItems":false},"cvssMetricV30":{"items":{"$ref":"#/components/schemas/api.NVD20CvssMetricV3"},"type":"array","uniqueItems":false},"cvssMetricV31":{"items":{"$ref":"#/components/schemas/api.NVD20CvssMetricV3"},"type":"array","uniqueItems":false},"cvssMetricV40":{"items":{"$ref":"#/components/schemas/api.NVD20CvssMetricV40"},"type":"array","uniqueItems":false}},"type":"object"},"api.NVD20MetricExtended":{"description":"api.NVD20MetricExtended","properties":{"cvssMetricV2":{"items":{"$ref":"#/components/schemas/api.NVD20CvssMetricV2"},"type":"array","uniqueItems":false},"cvssMetricV30":{"items":{"$ref":"#/components/schemas/api.NVD20CvssMetricV3"},"type":"array","uniqueItems":false},"cvssMetricV31":{"items":{"$ref":"#/components/schemas/api.NVD20CvssMetricV3"},"type":"array","uniqueItems":false},"cvssMetricV40":{"items":{"$ref":"#/components/schemas/api.NVD20CvssMetricV40"},"type":"array","uniqueItems":false},"epss":{"$ref":"#/components/schemas/api.EPSS"},"ssvc":{"items":{"$ref":"#/components/schemas/api.SSVC"},"type":"array","uniqueItems":false},"temporalCVSSV2":{"$ref":"#/components/schemas/api.NVD20TemporalCVSSV2"},"temporalCVSSV2Secondary":{"items":{"$ref":"#/components/schemas/api.NVD20TemporalCVSSV2"},"type":"array","uniqueItems":false},"temporalCVSSV30":{"$ref":"#/components/schemas/api.NVD20TemporalCVSSV3"},"temporalCVSSV30Secondary":{"items":{"$ref":"#/components/schemas/api.NVD20TemporalCVSSV3"},"type":"array","uniqueItems":false},"temporalCVSSV31":{"$ref":"#/components/schemas/api.NVD20TemporalCVSSV3"},"temporalCVSSV31Secondary":{"items":{"$ref":"#/components/schemas/api.NVD20TemporalCVSSV3"},"type":"array","uniqueItems":false},"threatCVSSV40":{"$ref":"#/components/schemas/api.NVD20ThreatCVSSV40"},"threatCVSSV40Secondary":{"items":{"$ref":"#/components/schemas/api.NVD20ThreatCVSSV40"},"type":"array","uniqueItems":false}},"type":"object"},"api.NVD20Reference":{"description":"api.NVD20Reference","properties":{"source":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"api.NVD20ReferenceExtended":{"description":"api.NVD20ReferenceExtended","properties":{"date_added":{"type":"string"},"external_id":{"type":"string"},"lang":{"type":"string"},"name":{"type":"string"},"previous_url":{"type":"string"},"refsource":{"type":"string"},"source":{"type":"string"},"status":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"api.NVD20TemporalAssociatedBaseMetric":{"description":"api.NVD20TemporalAssociatedBaseMetric","properties":{"baseScore":{"type":"number"},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.NVD20TemporalCVSSV2":{"description":"api.NVD20TemporalCVSSV2","properties":{"associatedBaseMetricV2":{"$ref":"#/components/schemas/api.NVD20TemporalAssociatedBaseMetric"},"exploitability":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"temporalScore":{"type":"number"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.NVD20TemporalCVSSV3":{"description":"api.NVD20TemporalCVSSV3","properties":{"associatedBaseMetricV3":{"$ref":"#/components/schemas/api.NVD20TemporalAssociatedBaseMetric"},"exploitCodeMaturity":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"temporalScore":{"type":"number"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.NVD20ThreatAssociatedBaseMetric":{"description":"api.NVD20ThreatAssociatedBaseMetric","properties":{"baseScore":{"type":"number"},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.NVD20ThreatCVSSV40":{"description":"api.NVD20ThreatCVSSV40","properties":{"associatedBaseMetricV40":{"$ref":"#/components/schemas/api.NVD20ThreatAssociatedBaseMetric"},"baseThreatScore":{"type":"number"},"baseThreatSeverity":{"type":"string"},"exploitMaturity":{"type":"string"}},"type":"object"},"api.NVD20VendorComment":{"description":"api.NVD20VendorComment","properties":{"comment":{"type":"string"},"lastModified":{"type":"string"},"organization":{"type":"string"}},"type":"object"},"api.NVD20Weakness":{"description":"api.NVD20Weakness","properties":{"description":{"items":{"$ref":"#/components/schemas/api.NVD20Description"},"type":"array","uniqueItems":false},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.NVD20WeaknessDescExtended":{"description":"api.NVD20WeaknessDescExtended","properties":{"lang":{"type":"string"},"name":{"type":"string"},"url":{"type":"string"},"value":{"type":"string"}},"type":"object"},"api.NVD20WeaknessExtended":{"description":"api.NVD20WeaknessExtended","properties":{"description":{"items":{"$ref":"#/components/schemas/api.NVD20WeaknessDescExtended"},"type":"array","uniqueItems":false},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.Nodes":{"description":"api.Nodes","properties":{"children":{"items":{"$ref":"#/components/schemas/api.Nodes"},"type":"array","uniqueItems":false},"cpe_match":{"items":{"$ref":"#/components/schemas/api.CPEMatch"},"type":"array","uniqueItems":false},"operator":{"type":"string"}},"type":"object"},"api.NormalizedExploitV3Entry":{"description":"api.NormalizedExploitV3Entry","properties":{"clone_ssh_url":{"type":"string"},"clone_ssh_url_cached":{"type":"string"},"date_added":{"type":"string"},"exploit_availability":{"type":"string"},"exploit_maturity":{"type":"string"},"exploit_type":{"type":"string"},"name":{"type":"string"},"reference_url":{"type":"string"},"refsource":{"type":"string"},"repo_id":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.NormalizedReportV3Entry":{"description":"api.NormalizedReportV3Entry","properties":{"date_added":{"type":"string"},"name":{"type":"string"},"refsource":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.OSSPackage":{"description":"api.OSSPackage","properties":{"artifacts":{"$ref":"#/components/schemas/api.OSSPackageArtifacts"},"cves":{"items":{"type":"string"},"type":"array","uniqueItems":false},"licenses":{"items":{"type":"string"},"type":"array","uniqueItems":false},"name":{"type":"string"},"published_date":{"type":"string"},"purl":{"items":{"type":"string"},"type":"array","uniqueItems":false},"research_attributes":{"$ref":"#/components/schemas/api.OSSPackageResearchAttributes"},"version":{"type":"string"},"vulnerabilities":{"items":{"$ref":"#/components/schemas/api.OSSPackageVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"api.OSSPackageArtifacts":{"description":"api.OSSPackageArtifacts","properties":{"binary":{"items":{"$ref":"#/components/schemas/api.OSSPackageDownloadInfo"},"type":"array","uniqueItems":false},"source":{"items":{"$ref":"#/components/schemas/api.OSSPackageDownloadInfo"},"type":"array","uniqueItems":false}},"type":"object"},"api.OSSPackageDownloadInfo":{"description":"api.OSSPackageDownloadInfo","properties":{"hashes":{"items":{"$ref":"#/components/schemas/api.OSSPackageHashInfo"},"type":"array","uniqueItems":false},"reference":{"type":"string"},"type":{"description":"See OSSPackageDownloadInfoType* consts","type":"string"},"url":{"type":"string"}},"type":"object"},"api.OSSPackageHashInfo":{"description":"api.OSSPackageHashInfo","properties":{"algorithm":{"description":"See OSSPackageHashInfoAlgo* consts","type":"string"},"type":{"description":"See OSSPackageHashInfoType* consts","type":"string"},"value":{"description":"hex string digest or link to hash","type":"string"}},"type":"object"},"api.OSSPackageResearchAttributes":{"description":"api.OSSPackageResearchAttributes","properties":{"abandoned":{"type":"boolean"},"eol":{"type":"boolean"},"is_malicious":{"type":"boolean"},"malicious_source":{"type":"string"},"repo_hijackable":{"type":"boolean"},"squatted_package":{"type":"string"}},"type":"object"},"api.OSSPackageVulnerability":{"description":"api.OSSPackageVulnerability","properties":{"detection":{"type":"string"},"fixed_version":{"type":"string"}},"type":"object"},"api.Package":{"description":"api.Package","properties":{"filename":{"type":"string"},"name":{"description":"sort","type":"string"},"release":{"type":"string"},"src":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.ProblemType":{"description":"api.ProblemType","properties":{"problemtype_data":{"items":{"$ref":"#/components/schemas/api.ProblemTypeData"},"type":"array","uniqueItems":false}},"type":"object"},"api.ProblemTypeData":{"description":"api.ProblemTypeData","properties":{"description":{"items":{"$ref":"#/components/schemas/api.ProblemTypeDescription"},"type":"array","uniqueItems":false}},"type":"object"},"api.ProblemTypeDataExtended":{"description":"api.ProblemTypeDataExtended","properties":{"description":{"items":{"$ref":"#/components/schemas/api.ProblemTypeDescriptionExtended"},"type":"array","uniqueItems":false}},"type":"object"},"api.ProblemTypeDescription":{"description":"api.ProblemTypeDescription","properties":{"lang":{"type":"string"},"value":{"type":"string"}},"type":"object"},"api.ProblemTypeDescriptionExtended":{"description":"api.ProblemTypeDescriptionExtended","properties":{"lang":{"type":"string"},"name":{"type":"string"},"url":{"type":"string"},"value":{"type":"string"}},"type":"object"},"api.ProblemTypeExtended":{"description":"api.ProblemTypeExtended","properties":{"problemtype_data":{"items":{"$ref":"#/components/schemas/api.ProblemTypeDataExtended"},"type":"array","uniqueItems":false}},"type":"object"},"api.Reference":{"description":"api.Reference","properties":{"href":{"description":"sort","type":"string"},"id":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.ReferenceData":{"description":"api.ReferenceData","properties":{"name":{"type":"string"},"refsource":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"api.ReferenceDataExtended":{"description":"api.ReferenceDataExtended","properties":{"date_added":{"type":"string"},"external_id":{"type":"string"},"lang":{"type":"string"},"name":{"type":"string"},"previous_url":{"type":"string"},"refsource":{"type":"string"},"status":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"api.References":{"description":"api.References","properties":{"reference_data":{"items":{"$ref":"#/components/schemas/api.ReferenceData"},"type":"array","uniqueItems":false}},"type":"object"},"api.ReferencesExtended":{"description":"api.ReferencesExtended","properties":{"reference_data":{"description":"ExploitData []NormalizedExploit `json:\"exploit_data,omitempty\"`\n\t\tThreatActorData []ThreatActorExtended `json:\"threat_actor_data,omitempty\"`\n\t\tRansomwareData []RansomwareReferenceData `json:\"ransomware_data,omitempty\"`\n\t\tAdvisoryData []AdvisoryExtended `json:\"advisory_data,omitempty\"`\n\t\tIdentifierData []IdentifierExtended `json:\"identifier_data,omitempty\"`","items":{"$ref":"#/components/schemas/api.ReferenceDataExtended"},"type":"array","uniqueItems":false}},"type":"object"},"api.RelatedAttackPattern":{"description":"api.RelatedAttackPattern","properties":{"capec_id":{"type":"string"},"capec_name":{"type":"string"},"capec_url":{"type":"string"},"lang":{"type":"string"}},"type":"object"},"api.SSVC":{"description":"api.SSVC","properties":{"automatable":{"type":"string"},"exploitation":{"type":"string"},"source":{"type":"string"},"technicalImpact":{"type":"string"}},"type":"object"},"api.TemporalCVSSV2":{"description":"api.TemporalCVSSV2","properties":{"exploitability":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"temporalScore":{"type":"number"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.TemporalCVSSV3":{"description":"api.TemporalCVSSV3","properties":{"exploitCodeMaturity":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"temporalScore":{"type":"number"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.TemporalMetricV2":{"description":"api.TemporalMetricV2","properties":{"cvssV2":{"$ref":"#/components/schemas/api.TemporalCVSSV2"}},"type":"object"},"api.TemporalMetricV3":{"description":"api.TemporalMetricV3","properties":{"cvssV3":{"$ref":"#/components/schemas/api.TemporalCVSSV3"}},"type":"object"},"api.Update":{"description":"api.Update","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"description":"sort // key","type":"string"},"issued":{"$ref":"#/components/schemas/api.DateTime"},"os_arch":{"type":"string"},"os_version":{"type":"string"},"packages":{"items":{"$ref":"#/components/schemas/api.Package"},"type":"array","uniqueItems":false},"references":{"items":{"$ref":"#/components/schemas/api.Reference"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"},"updated":{"$ref":"#/components/schemas/api.DateTime"}},"type":"object"},"api.VulnCheckCanary":{"description":"api.VulnCheckCanary","properties":{"category":{"type":"string"},"client_fingerprints":{"$ref":"#/components/schemas/api.ClientFingerprints"},"cve":{"type":"string"},"dst_country":{"type":"string"},"http":{"$ref":"#/components/schemas/api.HTTPDetails"},"payload":{"type":"string"},"severity":{"type":"integer"},"signature":{"type":"string"},"signature_id":{"type":"integer"},"src_country":{"type":"string"},"src_ip":{"type":"string"},"src_port":{"type":"integer"},"timestamp":{"type":"string"}},"type":"object"},"api.VulnerabilityAlias":{"description":"api.VulnerabilityAlias","properties":{"alias":{"type":"string"},"cve":{"type":"string"},"reference_url":{"type":"string"}},"type":"object"},"backup.BackupResponse":{"description":"backup.BackupResponse","properties":{"available":{"type":"boolean"},"feed":{"type":"string"},"url":{"type":"string"},"url_direct":{"type":"string"},"url_expires":{"type":"string"}},"type":"object"},"backup.FeedItem":{"description":"backup.FeedItem","properties":{"available":{"type":"boolean"},"backup_written_at":{"type":"string"},"href":{"type":"string"},"name":{"type":"string"}},"type":"object"},"backup.ListBackupsResponse":{"description":"backup.ListBackupsResponse","properties":{"data":{"items":{"$ref":"#/components/schemas/backup.FeedItem"},"type":"array","uniqueItems":false}},"type":"object"},"models.Entitlements":{"description":"models.Entitlements","properties":{"entitlements":{"additionalProperties":{"items":{"type":"string"},"type":"array"},"description":"Entitlements provides a map of roles to a list of entitlements","type":"object"}},"type":"object"},"paginate.Match":{"description":"paginate.Match","properties":{"field":{"type":"string"},"value":{"type":"string"}},"type":"object"},"paginate.Pagination":{"description":"paginate.Pagination","properties":{"cursor":{"description":"Cursor for the current page","type":"string"},"first_item":{"description":"First and last Item","type":"integer"},"index":{"description":"The requested index","type":"string"},"last_item":{"type":"integer"},"limit":{"description":"Per-Page limit","type":"integer"},"matches":{"items":{"$ref":"#/components/schemas/paginate.Match"},"type":"array","uniqueItems":false},"max_pages":{"type":"integer"},"next_cursor":{"description":"Cursor for the next page","type":"string"},"opensearch_query":{"type":"object"},"order":{"type":"string"},"page":{"description":"The current Page number","type":"integer"},"pages":{"items":{"type":"string"},"type":"array","uniqueItems":false},"parameters":{"items":{"$ref":"#/components/schemas/paginate.Param"},"type":"array","uniqueItems":false},"show_pages":{"type":"boolean"},"show_query":{"type":"boolean"},"sort":{"type":"string"},"timestamp":{"type":"string"},"total_documents":{"description":"The total number of items","type":"integer"},"total_pages":{"description":"The total number of pages","type":"integer"},"warnings":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"paginate.Param":{"description":"paginate.Param","properties":{"filtering":{"type":"string"},"format":{"type":"string"},"name":{"type":"string"}},"type":"object"},"params.IndexBackup":{"description":"params.IndexBackup","properties":{"date_added":{"type":"string"},"filename":{"type":"string"},"sha256":{"type":"string"},"url":{"type":"string"},"url_ap-southeast-2":{"type":"string"},"url_eu-west-2":{"type":"string"},"url_expires":{"type":"string"},"url_il-central-1":{"type":"string"},"url_me-central-1":{"type":"string"},"url_mrap":{"type":"string"},"url_ttl_minutes":{"type":"integer"},"url_us-east-1":{"type":"string"},"url_us-west-2":{"type":"string"}},"type":"object"},"params.IndexBackupList":{"description":"params.IndexBackupList","properties":{"description":{"type":"string"},"href":{"description":"Href API endpoint URI to detailed backup information","type":"string"},"name":{"type":"string"}},"type":"object"},"params.IndexList":{"description":"params.IndexList","properties":{"description":{"type":"string"},"href":{"description":"Href API endpoint URI to detailed index information","type":"string"},"name":{"type":"string"}},"type":"object"},"purl.BatchVulnFinding":{"description":"purl.BatchVulnFinding","properties":{"cves":{"description":"list of associated CVE 's","items":{"type":"string"},"type":"array","uniqueItems":false},"purl":{"description":"the purl, ex. hex/coherence@0.1.2","type":"string"},"purl_struct":{"$ref":"#/components/schemas/purl.PackageURLJSON"},"research_attributes":{"$ref":"#/components/schemas/api.OSSPackageResearchAttributes"},"vulnerabilities":{"description":"list of associated vulnerabilities","items":{"$ref":"#/components/schemas/api.OSSPackageVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"purl.PackageURLJSON":{"description":"meta-data about the purl","properties":{"name":{"type":"string"},"namespace":{"type":"string"},"qualifiers":{"items":{"$ref":"#/components/schemas/purl.QualifierJSON"},"type":"array","uniqueItems":false},"subpath":{"type":"string"},"type":{"type":"string"},"version":{"type":"string"}},"type":"object"},"purl.QualifierJSON":{"description":"purl.QualifierJSON","properties":{"key":{"type":"string"},"value":{"type":"string"}},"type":"object"},"purls.Artifact":{"description":"purls.Artifact","type":"object"},"purls.PurlResponse":{"description":"purls.PurlResponse","properties":{"artifacts":{"$ref":"#/components/schemas/purls.Artifact"},"cves":{"items":{"type":"string"},"type":"array","uniqueItems":false},"licenses":{"items":{"type":"string"},"type":"array","uniqueItems":false},"name":{"type":"string"},"published_date":{"type":"string"},"purl":{"items":{"type":"string"},"type":"array","uniqueItems":false},"version":{"type":"string"},"vulnerabilities":{"items":{"$ref":"#/components/schemas/purls.Vulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"purls.Vulnerability":{"description":"purls.Vulnerability","properties":{"arch":{"type":"string"},"detection":{"type":"string"},"fixed_version":{"type":"string"}},"type":"object"},"render.Response-array_params_IndexBackupList":{"description":"render.Response-array_params_IndexBackupList","properties":{"_benchmark":{"type":"number"},"data":{"items":{"$ref":"#/components/schemas/params.IndexBackupList"},"type":"array","uniqueItems":false}},"type":"object"},"render.Response-array_params_IndexList":{"description":"render.Response-array_params_IndexList","properties":{"_benchmark":{"type":"number"},"data":{"items":{"$ref":"#/components/schemas/params.IndexList"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_A10-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_A10-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.A10"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ABBAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ABBAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ABBAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AIX-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AIX-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AIX"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AMD-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AMD-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AMD"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AMI-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AMI-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AMI"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ASRG-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ASRG-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ASRG"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AVEVAAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AVEVAAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AVEVAAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AVIDMLAdvs-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AVIDMLAdvs-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AVIDMLAdvs"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AWS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AWS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AWS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Abbott-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Abbott-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Abbott"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Absolute-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Absolute-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Absolute"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Acronis-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Acronis-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Acronis"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AdobeAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AdobeAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AdobeAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Advantech-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Advantech-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Advantech"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Advisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Advisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Advisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AdvisoryRecord-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AdvisoryRecord-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AdvisoryRecord"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AlephResearch-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AlephResearch-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AlephResearch"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Alibaba-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Alibaba-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Alibaba"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AlmaLinuxUpdate-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AlmaLinuxUpdate-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AlmaLinuxUpdate"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AlpineLinuxSecDB-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AlpineLinuxSecDB-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AlpineLinuxSecDB"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AmazonCVE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AmazonCVE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AmazonCVE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AnchoreNVDOverride-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AnchoreNVDOverride-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AnchoreNVDOverride"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AndroidAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AndroidAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AndroidAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheActiveMQ-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheActiveMQ-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheActiveMQ"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheArchiva-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheArchiva-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheArchiva"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheArrow-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheArrow-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheArrow"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheCamel-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheCamel-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheCamel"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheCommons-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheCommons-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheCommons"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheCouchDB-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheCouchDB-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheCouchDB"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheFlink-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheFlink-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheFlink"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheGuacamole-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheGuacamole-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheGuacamole"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheHTTP-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheHTTP-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheHTTP"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheHadoop-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheHadoop-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheHadoop"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheJSPWiki-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheJSPWiki-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheJSPWiki"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheKafka-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheKafka-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheKafka"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheLoggingServices-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheLoggingServices-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheLoggingServices"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheNiFi-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheNiFi-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheNiFi"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheOFBiz-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheOFBiz-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheOFBiz"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheOpenMeetings-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheOpenMeetings-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheOpenMeetings"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheOpenOffice-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheOpenOffice-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheOpenOffice"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApachePulsar-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApachePulsar-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApachePulsar"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheShiro-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheShiro-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheShiro"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheSpark-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheSpark-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheSpark"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheStruts-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheStruts-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheStruts"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheSubversion-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheSubversion-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheSubversion"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheSuperset-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheSuperset-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheSuperset"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheTomcat-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheTomcat-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheTomcat"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheZooKeeper-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheZooKeeper-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheZooKeeper"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AppCheck-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AppCheck-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AppCheck"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Appgate-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Appgate-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Appgate"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AppleAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AppleAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AppleAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ArchIssue-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ArchIssue-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ArchIssue"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Arista-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Arista-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Arista"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Aruba-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Aruba-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Aruba"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AssetNote-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AssetNote-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AssetNote"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Asterisk-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Asterisk-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Asterisk"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Astra-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Astra-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Astra"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Asus-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Asus-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Asus"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AtlassianAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AtlassianAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AtlassianAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AtlassianVuln-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AtlassianVuln-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AtlassianVuln"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Atredis-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Atredis-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Atredis"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Audiocodes-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Audiocodes-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Audiocodes"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AusCert-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AusCert-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AusCert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Autodesk-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Autodesk-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Autodesk"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Avaya-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Avaya-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Avaya"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Avigilon-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Avigilon-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Avigilon"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Axis-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Axis-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Axis"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Azul-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Azul-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Azul"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BBraunAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BBraunAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BBraunAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BDUAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BDUAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BDUAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BLS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BLS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BLS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Bandr-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Bandr-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Bandr"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BaxterAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BaxterAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BaxterAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BeckhoffAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BeckhoffAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BeckhoffAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BeckmanCoulter-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BeckmanCoulter-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BeckmanCoulter"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BectonDickinsonAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BectonDickinsonAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BectonDickinsonAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BeldenAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BeldenAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BeldenAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BeyondTrust-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BeyondTrust-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BeyondTrust"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Binarly-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Binarly-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Binarly"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BitDefender-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BitDefender-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BitDefender"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BlackBerry-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BlackBerry-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BlackBerry"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BoschAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BoschAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BoschAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BostonScientificAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BostonScientificAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BostonScientificAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Botnet-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Botnet-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Botnet"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CACyberCentreAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CACyberCentreAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CACyberCentreAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CBLMariner-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CBLMariner-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CBLMariner"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CERTEUAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CERTEUAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CERTEUAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CESA-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CESA-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CESA"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CISAAlert-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CISAAlert-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CISAAlert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CNNVDEntryJSON-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CNNVDEntryJSON-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CNNVDEntryJSON"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CNVDBulletin-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CNVDBulletin-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CNVDBulletin"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CNVDFlaw-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CNVDFlaw-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CNVDFlaw"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CanvasExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CanvasExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CanvasExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CarestreamAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CarestreamAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CarestreamAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Carrier-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Carrier-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Carrier"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertBE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CertBE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CertBE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertFRAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CertFRAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CertFRAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertIN-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CertIN-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CertIN"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertIRSecurityAlert-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CertIRSecurityAlert-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CertIRSecurityAlert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertSE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CertSE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CertSE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertUA-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CertUA-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CertUA"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ChainGuard-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ChainGuard-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ChainGuard"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CheckPoint-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CheckPoint-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CheckPoint"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Chrome-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Chrome-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Chrome"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Ciena-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Ciena-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Ciena"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CisaCsafAdv-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CisaCsafAdv-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CisaCsafAdv"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CiscoAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CiscoAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CiscoAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CiscoCSAF-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CiscoCSAF-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CiscoCSAF"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CiscoKnownGoodValue-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CiscoKnownGoodValue-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CiscoKnownGoodValue"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CitrixAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CitrixAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CitrixAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ClarotyVulnerability-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ClarotyVulnerability-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ClarotyVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CloudBees-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CloudBees-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CloudBees"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CloudVulnDBAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CloudVulnDBAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CloudVulnDBAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CodesysAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CodesysAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CodesysAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CommVault-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CommVault-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CommVault"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CompassSecurity-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CompassSecurity-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CompassSecurity"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ContainerOS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ContainerOS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ContainerOS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CoreImpactExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CoreImpactExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CoreImpactExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Crestron-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Crestron-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Crestron"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CrowdSec-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CrowdSec-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CrowdSec"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Curl-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Curl-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Curl"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Cvrf-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Cvrf-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Cvrf"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DFNCert-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_DFNCert-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.DFNCert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DLink-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_DLink-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.DLink"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DNN-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_DNN-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.DNN"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Dahua-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Dahua-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Dahua"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Danfoss-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Danfoss-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Danfoss"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Dassault-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Dassault-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Dassault"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DebianSecurityAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_DebianSecurityAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.DebianSecurityAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Dell-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Dell-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Dell"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DeltaAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_DeltaAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.DeltaAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DistroPackage-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_DistroPackage-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.DistroPackage"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Django-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Django-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Django"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DotCMS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_DotCMS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.DotCMS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DragosAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_DragosAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.DragosAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Draytek-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Draytek-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Draytek"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Drupal-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Drupal-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Drupal"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EOLAlibaba-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_EOLAlibaba-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.EOLAlibaba"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EOLMicrosoft-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_EOLMicrosoft-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.EOLMicrosoft"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EOLReleaseData-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_EOLReleaseData-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.EOLReleaseData"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EUVD-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_EUVD-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.EUVD"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EatonAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_EatonAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.EatonAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Elastic-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Elastic-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Elastic"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Elspec-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Elspec-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Elspec"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EmergingThreatsSnort-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_EmergingThreatsSnort-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.EmergingThreatsSnort"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EmersonAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_EmersonAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.EmersonAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EndOfLife-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_EndOfLife-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.EndOfLife"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Endress-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Endress-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Endress"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ExodusIntel-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ExodusIntel-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ExodusIntel"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ExploitDBExploitv2-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ExploitDBExploitv2-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ExploitDBExploitv2"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_F5-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_F5-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.F5"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FSecure-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_FSecure-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.FSecure"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Fanuc-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Fanuc-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Fanuc"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Fastly-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Fastly-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Fastly"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Festo-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Festo-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Festo"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FileCloud-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_FileCloud-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.FileCloud"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FileZilla-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_FileZilla-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.FileZilla"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FlattSecurity-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_FlattSecurity-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.FlattSecurity"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ForgeRock-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ForgeRock-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ForgeRock"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FortinetAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_FortinetAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.FortinetAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FortinetIPS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_FortinetIPS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.FortinetIPS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Foxit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Foxit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Foxit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Fresenius-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Fresenius-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Fresenius"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GCP-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GCP-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GCP"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GEGas-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GEGas-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GEGas"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GEHealthcareAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GEHealthcareAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GEHealthcareAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GHAdvisoryJSONLean-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GHAdvisoryJSONLean-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GHAdvisoryJSONLean"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GHSA-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GHSA-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GHSA"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GMOCyberSecurity-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GMOCyberSecurity-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GMOCyberSecurity"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Gallagher-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Gallagher-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Gallagher"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Gen-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Gen-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Gen"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GenericEOL-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GenericEOL-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GenericEOL"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Genetec-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Genetec-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Genetec"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Gigabyte-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Gigabyte-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Gigabyte"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GitHubExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GitHubExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GitHubExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GitLabExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GitLabExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GitLabExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GiteeExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GiteeExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GiteeExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GitlabAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GitlabAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GitlabAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Glibc-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Glibc-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Glibc"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GnuTLS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GnuTLS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GnuTLS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GoVulnJSON-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GoVulnJSON-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GoVulnJSON"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Grafana-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Grafana-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Grafana"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GreyNoiseDetection-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GreyNoiseDetection-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GreyNoiseDetection"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HCL-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HCL-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HCL"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HIKVision-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HIKVision-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HIKVision"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HKCert-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HKCert-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HKCert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HMS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HMS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HMS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HP-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HP-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HP"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HPE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HPE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HPE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Hacktivity-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Hacktivity-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Hacktivity"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HarmonyOS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HarmonyOS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HarmonyOS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HashiCorp-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HashiCorp-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HashiCorp"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HaskellSADBAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HaskellSADBAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HaskellSADBAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HillromAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HillromAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HillromAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Hitachi-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Hitachi-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Hitachi"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HitachiEnergy-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HitachiEnergy-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HitachiEnergy"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Honeywell-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Honeywell-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Honeywell"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Huawei-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Huawei-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Huawei"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HuaweiEulerOS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HuaweiEulerOS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HuaweiEulerOS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HuaweiIPS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HuaweiIPS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HuaweiIPS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IAVA-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_IAVA-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.IAVA"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IBM-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_IBM-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.IBM"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ITWExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ITWExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ITWExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Idemia-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Idemia-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Idemia"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Igel-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Igel-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Igel"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IncibeAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_IncibeAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.IncibeAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Intel-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Intel-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Intel"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.IpIntelRecord"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IsraeliAlert-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_IsraeliAlert-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.IsraeliAlert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IsraeliVulnerability-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_IsraeliVulnerability-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.IsraeliVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Istio-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Istio-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Istio"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Ivanti-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Ivanti-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Ivanti"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IvantiRSS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_IvantiRSS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.IvantiRSS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JFrog-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_JFrog-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.JFrog"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JNJAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_JNJAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.JNJAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JVN-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_JVN-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.JVN"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JVNAdvisoryItem-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_JVNAdvisoryItem-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.JVNAdvisoryItem"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Jenkins-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Jenkins-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Jenkins"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JetBrains-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_JetBrains-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.JetBrains"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JohnsonControls-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_JohnsonControls-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.JohnsonControls"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Juniper-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Juniper-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Juniper"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_K8S-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_K8S-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.K8S"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_KEVCatalogVulnerability-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_KEVCatalogVulnerability-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.KEVCatalogVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_KRCertAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_KRCertAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.KRCertAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_KasperskyICSCERTAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_KasperskyICSCERTAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.KasperskyICSCERTAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_KoreLogic-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_KoreLogic-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.KoreLogic"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Kunbus-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Kunbus-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Kunbus"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_LG-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_LG-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.LG"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Lantronix-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Lantronix-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Lantronix"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Lenovo-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Lenovo-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Lenovo"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_LexmarkAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_LexmarkAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.LexmarkAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_LibreOffice-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_LibreOffice-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.LibreOffice"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Linux-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Linux-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Linux"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_LolAdvs-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_LolAdvs-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.LolAdvs"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MACert-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MACert-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MACert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MFiles-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MFiles-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MFiles"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MaliciousPackage-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MaliciousPackage-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MaliciousPackage"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MaliciousVSCodeExts-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MaliciousVSCodeExts-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MaliciousVSCodeExts"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ManageEngineAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ManageEngineAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ManageEngineAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MbedTLS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MbedTLS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MbedTLS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_McAfee-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_McAfee-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.McAfee"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Mediatek-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Mediatek-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Mediatek"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MedtronicAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MedtronicAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MedtronicAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Mendix-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Mendix-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Mendix"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MetaAdvisories-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MetaAdvisories-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MetaAdvisories"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MetaData-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MetaData-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MetaData"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MetasploitExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MetasploitExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MetasploitExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MicrosoftCSAF-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MicrosoftCSAF-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MicrosoftCSAF"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MicrosoftCVRF-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MicrosoftCVRF-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MicrosoftCVRF"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MicrosoftDriverBlockList-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MicrosoftDriverBlockList-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MicrosoftDriverBlockList"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MicrosoftKb-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MicrosoftKb-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MicrosoftKb"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Mikrotik-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Mikrotik-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Mikrotik"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Mindray-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Mindray-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Mindray"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MispValue-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MispValue-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MispValue"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Mitel-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Mitel-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Mitel"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MitreCVEListV5-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MitreCVEListV5-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MitreCVEListV5"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MitsubishiElectricAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MitsubishiElectricAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MitsubishiElectricAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MongoDB-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MongoDB-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MongoDB"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MoxaAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MoxaAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MoxaAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MozillaAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MozillaAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MozillaAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NCSC-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NCSC-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NCSC"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NCSCCVE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NCSCCVE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NCSCCVE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NEC-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NEC-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NEC"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NHS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NHS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NHS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NI-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NI-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NI"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NTP-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NTP-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NTP"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NVD20Source-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NVD20Source-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NVD20Source"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NVDCPEDictionary-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NVDCPEDictionary-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NVDCPEDictionary"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NZAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NZAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NZAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Naver-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Naver-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Naver"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Nessus-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Nessus-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Nessus"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NetApp-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NetApp-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NetApp"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Netatalk-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Netatalk-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Netatalk"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Netgate-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Netgate-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Netgate"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Netgear-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Netgear-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Netgear"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Netskope-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Netskope-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Netskope"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Nexpose-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Nexpose-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Nexpose"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NginxAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NginxAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NginxAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NodeJS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NodeJS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NodeJS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NodeSecurity-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NodeSecurity-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NodeSecurity"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Nokia-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Nokia-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Nokia"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NotePadPlusPlus-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NotePadPlusPlus-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NotePadPlusPlus"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Nozomi-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Nozomi-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Nozomi"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Nuclei-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Nuclei-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Nuclei"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OSV-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OSV-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OSV"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OTRS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OTRS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OTRS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OctopusDeploy-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OctopusDeploy-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OctopusDeploy"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Okta-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Okta-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Okta"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Omron-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Omron-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Omron"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OneE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OneE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OneE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenBSD-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OpenBSD-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OpenBSD"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenCVDB-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OpenCVDB-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OpenCVDB"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenJDK-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OpenJDK-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OpenJDK"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenSSH-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OpenSSH-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OpenSSH"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenSSLSecAdv-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OpenSSLSecAdv-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OpenSSLSecAdv"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenStack-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OpenStack-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OpenStack"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Opengear-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Opengear-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Opengear"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OracleCPU-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OracleCPU-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OracleCPU"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OracleCPUCSAF-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OracleCPUCSAF-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OracleCPUCSAF"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OwnCloud-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OwnCloud-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OwnCloud"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PHPMyAdmin-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PHPMyAdmin-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PHPMyAdmin"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PKCert-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PKCert-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PKCert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PTC-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PTC-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PTC"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PacketstormExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PacketstormExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PacketstormExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Palantir-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Palantir-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Palantir"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PaloAltoAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PaloAltoAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PaloAltoAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Panasonic-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Panasonic-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Panasonic"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PaperCut-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PaperCut-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PaperCut"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Pega-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Pega-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Pega"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PhilipsAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PhilipsAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PhilipsAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PhoenixContactAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PhoenixContactAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PhoenixContactAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PostgresSQL-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PostgresSQL-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PostgresSQL"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PowerDNS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PowerDNS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PowerDNS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Progress-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Progress-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Progress"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Proofpoint-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Proofpoint-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Proofpoint"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PureStorage-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PureStorage-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PureStorage"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PyPAAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PyPAAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PyPAAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_QNAPAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_QNAPAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.QNAPAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_QQID-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_QQID-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.QQID"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_QSB-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_QSB-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.QSB"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Qualcomm-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Qualcomm-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Qualcomm"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Qualys-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Qualys-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Qualys"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_QualysQID-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_QualysQID-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.QualysQID"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RansomwareExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_RansomwareExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.RansomwareExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RedLion-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_RedLion-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.RedLion"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RedhatCVE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_RedhatCVE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.RedhatCVE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Renesas-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Renesas-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Renesas"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Revive-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Revive-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Revive"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RhelCVE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_RhelCVE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.RhelCVE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Roche-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Roche-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Roche"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Rockwell-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Rockwell-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Rockwell"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RockyErrata-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_RockyErrata-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.RockyErrata"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Rsync-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Rsync-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Rsync"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Ruckus-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Ruckus-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Ruckus"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RustsecAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_RustsecAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.RustsecAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SAAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SAAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SAAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SAP-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SAP-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SAP"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SECConsult-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SECConsult-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SECConsult"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SSDAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SSDAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SSDAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Safran-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Safran-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Safran"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SaintExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SaintExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SaintExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SalesForce-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SalesForce-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SalesForce"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Samba-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Samba-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Samba"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sandisk-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Sandisk-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Sandisk"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SansDshield-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SansDshield-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SansDshield"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SchneiderElectricAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SchneiderElectricAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SchneiderElectricAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Schutzwerk-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Schutzwerk-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Schutzwerk"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SecurityBulletin-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SecurityBulletin-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SecurityBulletin"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SecurityLab-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SecurityLab-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SecurityLab"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SeebugExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SeebugExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SeebugExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sel-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Sel-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Sel"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SentinelOne-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SentinelOne-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SentinelOne"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ServiceNow-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ServiceNow-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ServiceNow"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SevenZip-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SevenZip-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SevenZip"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ShadowServerExploitedVulnerability-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ShadowServerExploitedVulnerability-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ShadowServerExploitedVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Shielder-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Shielder-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Shielder"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sick-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Sick-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Sick"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SiemensAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SiemensAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SiemensAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SierraWireless-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SierraWireless-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SierraWireless"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SigmaRule-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SigmaRule-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SigmaRule"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SingCert-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SingCert-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SingCert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sitecore-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Sitecore-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Sitecore"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Slackware-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Slackware-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Slackware"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SolarWindsAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SolarWindsAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SolarWindsAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Solr-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Solr-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Solr"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sonatype-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Sonatype-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Sonatype"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SonicWallAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SonicWallAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SonicWallAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SpacelabsHealthcareAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SpacelabsHealthcareAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SpacelabsHealthcareAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Splunk-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Splunk-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Splunk"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Spring-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Spring-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Spring"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Stormshield-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Stormshield-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Stormshield"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_StrykerAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_StrykerAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.StrykerAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sudo-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Sudo-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Sudo"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SuseSecurity-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SuseSecurity-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SuseSecurity"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SwisslogHealthcareAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SwisslogHealthcareAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SwisslogHealthcareAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Symfony-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Symfony-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Symfony"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Synacktiv-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Synacktiv-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Synacktiv"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SyncroSoft-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SyncroSoft-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SyncroSoft"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Synology-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Synology-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Synology"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Syss-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Syss-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Syss"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TI-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_TI-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TI"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TPLink-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_TPLink-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TPLink"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TWCertAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_TWCertAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TWCertAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Tailscale-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Tailscale-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Tailscale"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TalosAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_TalosAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TalosAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TeamViewer-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_TeamViewer-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TeamViewer"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TenableResearchAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_TenableResearchAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TenableResearchAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Tencent-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Tencent-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Tencent"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Thales-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Thales-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Thales"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TheMissingLink-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_TheMissingLink-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TheMissingLink"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ThermoFisher-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ThermoFisher-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ThermoFisher"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ThreatActorWithExternalObjects-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ThreatActorWithExternalObjects-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ThreatActorWithExternalObjects"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Tibco-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Tibco-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Tibco"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TraneTechnology-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_TraneTechnology-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TraneTechnology"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TrendMicro-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_TrendMicro-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TrendMicro"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Trustwave-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Trustwave-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Trustwave"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_USD-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_USD-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.USD"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_USOMAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_USOMAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.USOMAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Ubiquiti-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Ubiquiti-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Ubiquiti"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_UbuntuCVE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_UbuntuCVE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.UbuntuCVE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Unify-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Unify-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Unify"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Unisoc-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Unisoc-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Unisoc"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Update-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Update-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Update"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VCCPEDictionary-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VCCPEDictionary-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VCCPEDictionary"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VCVulnerableCPEs-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VCVulnerableCPEs-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VCVulnerableCPEs"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VDEAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VDEAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VDEAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VLC-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VLC-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VLC"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VMWareAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VMWareAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VMWareAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VYAIREAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VYAIREAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VYAIREAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VanDyke-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VanDyke-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VanDyke"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VapidLabsAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VapidLabsAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VapidLabsAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Veeam-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Veeam-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Veeam"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Veritas-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Veritas-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Veritas"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Virtuozzo-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Virtuozzo-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Virtuozzo"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VoidSec-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VoidSec-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VoidSec"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VulnCheck-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VulnCheck-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VulnCheck"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VulnCheckCVEListV5-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VulnCheckCVEListV5-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VulnCheckCVEListV5"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VulnCheckConfig-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VulnCheckConfig-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VulnCheckConfig"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VulnCheckKEV-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VulnCheckKEV-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VulnCheckKEV"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VulnerableDebianPackage-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VulnerableDebianPackage-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VulnerableDebianPackage"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Vulnrichment-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Vulnrichment-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Vulnrichment"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_WRT-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_WRT-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.WRT"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_WatchGuard-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_WatchGuard-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.WatchGuard"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_WhatsApp-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_WhatsApp-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.WhatsApp"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Wibu-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Wibu-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Wibu"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Wireshark-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Wireshark-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Wireshark"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_WithSecure-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_WithSecure-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.WithSecure"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_WolfSSL-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_WolfSSL-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.WolfSSL"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Wolfi-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Wolfi-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Wolfi"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Wordfence-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Wordfence-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Wordfence"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Xen-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Xen-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Xen"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Xerox-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Xerox-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Xerox"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Xiaomi-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Xiaomi-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Xiaomi"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Xylem-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Xylem-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Xylem"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Yamaha-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Yamaha-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Yamaha"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_YokogawaAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_YokogawaAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.YokogawaAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Yubico-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Yubico-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Yubico"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zebra-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Zebra-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Zebra"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ZeroDayAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ZeroDayAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ZeroDayAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ZeroScienceAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ZeroScienceAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ZeroScienceAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zimbra-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Zimbra-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Zimbra"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zoom-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Zoom-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Zoom"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zscaler-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Zscaler-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Zscaler"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zuso-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Zuso-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Zuso"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zyxel-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Zyxel-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Zyxel"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_CWE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_CWE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.CWE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_CveItems-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_CveItems-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.CveItems"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_CveItemsExtended-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_CveItemsExtended-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.CveItemsExtended"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_EPSSData-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_EPSSData-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.EPSSData"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_ExploitChain-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_ExploitChain-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.ExploitChain"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_ExploitV3Result-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_ExploitV3Result-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.ExploitV3Result"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_ExploitsChangelog-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_ExploitsChangelog-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.ExploitsChangelog"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_InitialAccess-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_InitialAccess-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.InitialAccess"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_MitreAttackToCVE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_MitreAttackToCVE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.MitreAttackToCVE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_NVD20CPEMatch-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_NVD20CPEMatch-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.NVD20CPEMatch"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_NVD20CVE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_NVD20CVE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.NVD20CVE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_NVD20CVEExtended-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_NVD20CVEExtended-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.NVD20CVEExtended"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.OSSPackage"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_Update-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_Update-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.Update"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.VulnCheckCanary"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_VulnerabilityAlias-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_VulnerabilityAlias-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.VulnerabilityAlias"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/purls.PurlResponse"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_string-v3controllers_ResponseMetadata":{"description":"render.ResponseWithMetadata-array_string-v3controllers_ResponseMetadata","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/v3controllers.ResponseMetadata"},"data":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-v3controllers_BackupResponseData-v3controllers_BackupResponseMetadata":{"description":"render.ResponseWithMetadata-v3controllers_BackupResponseData-v3controllers_BackupResponseMetadata","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/v3controllers.BackupResponseMetadata"},"data":{"items":{"$ref":"#/components/schemas/params.IndexBackup"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-v3controllers_PurlResponseData-v3controllers_PurlResponseMetadata":{"description":"render.ResponseWithMetadata-v3controllers_PurlResponseData-v3controllers_PurlResponseMetadata","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/v3controllers.PurlResponseMetadata"},"data":{"$ref":"#/components/schemas/v3controllers.PurlResponseData"}},"type":"object"},"render.ResponseWithMetadata-v3controllers_PurlsResponseData-v3controllers_PurlsResponseMetadata":{"description":"render.ResponseWithMetadata-v3controllers_PurlsResponseData-v3controllers_PurlsResponseMetadata","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/v3controllers.PurlsResponseMetadata"},"data":{"items":{"$ref":"#/components/schemas/purl.BatchVulnFinding"},"type":"array","uniqueItems":false}},"type":"object"},"search.ErrorResponse":{"description":"search.ErrorResponse","properties":{"error":{"type":"boolean"},"errors":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"search.V4AdvisoryMeta":{"description":"search.V4AdvisoryMeta","properties":{"cursor":{"type":"string"},"filtered":{"type":"integer"},"limit":{"type":"integer"},"next_cursor":{"type":"string"},"page":{"type":"integer"},"pages":{"type":"integer"},"total":{"type":"integer"}},"type":"object"},"search.V4AdvisoryReturnValue":{"description":"search.V4AdvisoryReturnValue","properties":{"_meta":{"$ref":"#/components/schemas/search.V4AdvisoryMeta"},"data":{"items":{"$ref":"#/components/schemas/advisory.MitreCVEListV5Ref"},"type":"array","uniqueItems":false}},"type":"object"},"search.V4FeedItem":{"description":"search.V4FeedItem","properties":{"description":{"type":"string"},"href":{"type":"string"},"name":{"type":"string"}},"type":"object"},"search.V4ListFeedReturnValue":{"description":"search.V4ListFeedReturnValue","properties":{"data":{"items":{"$ref":"#/components/schemas/search.V4FeedItem"},"type":"array","uniqueItems":false}},"type":"object"},"v3controllers.BackupResponseMetadata":{"description":"v3controllers.BackupResponseMetadata","properties":{"index":{"type":"string"},"timestamp":{"type":"string"}},"type":"object"},"v3controllers.PurlResponseData":{"description":"v3controllers.PurlResponseData","properties":{"cves":{"description":"list of associated CVE 's","items":{"type":"string"},"type":"array","uniqueItems":false},"vulnerabilities":{"description":"list of associated vulnerabilities","items":{"$ref":"#/components/schemas/api.OSSPackageVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"v3controllers.PurlResponseMetadata":{"description":"v3controllers.PurlResponseMetadata","properties":{"purl_struct":{"$ref":"#/components/schemas/purl.PackageURLJSON"},"timestamp":{"description":"time of the transaction","type":"string"},"total_documents":{"description":"number of results found","type":"integer"}},"type":"object"},"v3controllers.PurlsResponseMetadata":{"description":"v3controllers.PurlsResponseMetadata","properties":{"timestamp":{"description":"time of the transaction","type":"string"},"total_documents":{"description":"number of results found","type":"integer"}},"type":"object"},"v3controllers.ResponseMetadata":{"description":"v3controllers.ResponseMetadata","properties":{"cpe":{"type":"string"},"cpe_struct":{"$ref":"#/components/schemas/api.CPE"},"timestamp":{"type":"string"},"total_documents":{"type":"integer"}},"type":"object"}},"securitySchemes":{"Bearer":{"in":"header","name":"Authorization","type":"apiKey"}}},"externalDocs":{"description":"","url":""},"info":{"contact":{"email":"support@vulncheck.com","name":"VulnCheck API Support"},"description":"VulnCheck API (v3 + v4)","termsOfService":"https://vulncheck.com/terms","title":"VulnCheck API","version":"latest"},"openapi":"3.1.0","paths":{"/v3/backup":{"get":{"description":"Return a list of indexes with backup and endpoint links that the user has access to","operationId":"backup_get","responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.Response-array_params_IndexBackupList"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"oneOf":[{"type":"string"},{"type":"string"}]}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return a list of indexes with backup and endpoint links","tags":["endpoints"]}},"/v3/backup/{index}":{"get":{"description":"Retrieve a list of VulnCheck backups by index","operationId":"backup_index_get","parameters":[{"description":"Name of an exploit, vulnerability, or advisory index","in":"path","name":"index","required":true,"schema":{"enum":["7zip","a10","abb","abbott","absolute","acronis","adobe","advantech","advisories","aix","aleph-research","alibaba-advs","alma","alpine","alpine-purls","amazon","amazon-cve","amd","ami","anchore-nvd-override","android","apache-activemq","apache-archiva","apache-arrow","apache-camel","apache-commons","apache-couchdb","apache-flink","apache-guacamole","apache-hadoop","apache-http","apache-jspwiki","apache-kafka","apache-loggingservices","apache-nifi","apache-ofbiz","apache-openmeetings","apache-openoffice","apache-pulsar","apache-shiro","apache-spark","apache-struts","apache-subversion","apache-superset","apache-tomcat","apache-zookeeper","appcheck","appgate","apple","arch","arista","aruba","asrg","assetnote","asterisk","astra","asus","atlassian","atlassian-vulns","atredis","audiocodes","auscert","autodesk","avaya","aveva","avidml-advs","avigilon","aws","axis","azul","bandr","baxter","bbraun","bd","bdu","beckhoff","beckman-coulter","belden","beyond-trust","binarly","bitdefender","blackberry","bls","bosch","boston-scientific","botnets","ca-cyber-centre","canvas","carestream","cargo","carrier","cbl-mariner","centos","cert-be","cert-in","cert-ir-security-alerts","cert-se","cert-ua","certeu","certfr","chainguard","checkpoint","chrome","ciena","cisa-alerts","cisa-csaf","cisa-kev","cisco","cisco-csaf","cisco-known-good-values","cisco-talos","citrix","claroty","cloudbees","cloudvulndb","cnnvd","cnvd-bulletins","cnvd-flaws","cocoapods","codesys","commvault","compass-security","composer","conan","coreimpact","cpe-vulnerable","crestron","crowdsec","curl","cwe","dahua","danfoss","dassault","debian","debian-dsa","debian-packages","debian-purls","dell","delta","dfn-cert","django","dlink","dnn","dotcms","dragos","draytek","drupal","eaton","elastic","elspec","emerging-threats-snort","emerson","endoflife","endress","eol","eol-alibaba","eol-microsoft","epss","euvd","exodus-intel","exploit-chains","exploitdb","exploits","exploits-changelog","f-secure","f5","fanuc","fastly","fedora","festo","filecloud","filezilla","flatt-security","forgerock","fortinet","fortinet-ips","foxit","freebsd","fresenius","gallagher","gcp","ge-gas","ge-healthcare","gem","gen","genetec","ghsa","gigabyte","gitee-exploits","github-exploits","github-security-advisories","gitlab-advisories-community","gitlab-exploits","glibc","gmo-cybersecurity","gnutls","go-vulndb","golang","google-0day-itw","google-container-optimized-os","grafana","greynoise-metadata","hackage","hacktivity","harmonyos","hashicorp","haskell-sadb","hcl","hex","hikvision","hillrom","hitachi","hitachi-energy","hkcert","hms","honeywell","hp","hpe","huawei-euleros","huawei-ips","huawei-psirt","iava","ibm","idemia","igel","il-alerts","il-vulnerabilities","incibe","initial-access","initial-access-git","intel","ipintel-10d","ipintel-30d","ipintel-3d","ipintel-90d","istio","ivanti","ivanti-rss","jenkins","jetbrains","jfrog","jnj","johnson-controls","juniper","jvn","jvndb","kaspersky-ics-cert","korelogic","krcert-security-notices","krcert-vulnerabilities","kubernetes","kunbus","lantronix","lenovo","lexmark","lg","libre-office","linux","lol-advs","m-files","macert","malicious-packages","malicious-vscode-exts","manageengine","maven","mbed-tls","mcafee","mediatek","medtronic","mendix","meta-advisories","metasploit","microsoft-csaf","microsoft-cvrf","microsoft-driver-block-list","microsoft-kb","mikrotik","mindray","misp-threat-actors","mitel","mitre-attack-cve","mitre-cvelist-v5","mitsubishi-electric","mongodb","moxa","mozilla","naver","ncsc","ncsc-cves","nec","nessus","netapp","netatalk","netgate","netgear","netskope","nexpose","nginx","nhs","ni","nist-nvd","nist-nvd2","nist-nvd2-cpematch","nist-nvd2-sources","node-security","nodejs","nokia","notepadplusplus","nozomi","npm","ntp","nuclei","nuget","nvd-cpe-dictionary","nvidia","nz-advisories","octopus-deploy","okta","omron","omron-eol","one-e","opam","open-cvdb","openbsd","opengear","openjdk","openssh","openssl-secadv","openstack","openwrt","oracle","oracle-cpu","oracle-cpu-csaf","osv","otrs","owncloud","packetstorm","palantir","palo-alto","panasonic","papercut","pega","philips","phoenix-contact","php-my-admin","pkcert","postgressql","powerdns","progress","proofpoint","ptc","pub","pure-storage","pypa-advisories","pypi","qnap","qqids","qualcomm","qualys","qualys-qids","qubes-qsb","ransomware","red-lion","redhat","redhat-cves","renesas","revive","roche","rockwell","rocky","rocky-errata","rocky-purls","rsync","ruckus","rustsec-advisories","sacert","safran","saint","salesforce","samba","sandisk","sans-dshield","sap","schneider-electric","schutzwerk","sec-consult","securitylab","seebug","sel","sentinelone","servicenow","shadowserver-exploited","shielder","sick","siemens","sierra-wireless","sigmahq-sigma-rules","singcert","sitecore","slackware","solarwinds","solr","sonatype","sonicwall","spacelabs-healthcare","splunk","spring","ssd","stormshield","stryker","sudo","suse","suse-security","swift","swisslog-healthcare","symfony","synacktiv","syncrosoft","synology","syss","tailscale","teamviewer","tenable-research-advisories","tencent","thales","themissinglink","thermo-fisher","threat-actors","ti","tibco","tp-link","trane-technology","trendmicro","trustwave","twcert","ubiquiti","ubuntu","ubuntu-purls","unify","unisoc","usd","usom","vandyke","vapidlabs","vc-cpe-dictionary","vde","veeam","veritas","virtuozzo","vlc","vmware","voidsec","vulncheck","vulncheck-canaries","vulncheck-canaries-10d","vulncheck-canaries-30d","vulncheck-canaries-3d","vulncheck-canaries-90d","vulncheck-config","vulncheck-cvelist-v5","vulncheck-kev","vulncheck-nvd","vulncheck-nvd2","vulnerability-aliases","vulnrichment","vyaire","watchguard","whatsapp","wibu","wireshark","with-secure","wolfi","wolfssl","wordfence","xen","xerox","xiaomi","xylem","yamaha","yokogawa","yubico","zdi","zebra","zebra-eol","zeroscience","zimbra","zoom","zscaler","zuso","zyxel"],"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-v3controllers_BackupResponseData-v3controllers_BackupResponseMetadata"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Retrieve a list of backups by index","tags":["endpoints"]}},"/v3/cpe":{"get":{"description":"Based on the specified CPE (Common Platform Enumeration) URI string, this endpoint will return a list of vulnerabilities that are related to the package. We support v2.2 and v2.3","operationId":"cpe_get","parameters":[{"description":"CPE designation to lookup","in":"query","name":"cpe","required":true,"schema":{"type":"string"}},{"description":"Filter by vulnerability status (true/false). Defaults to false if not provided.","in":"query","name":"isVulnerable","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_string-v3controllers_ResponseMetadata"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return CVE 's associated with a specific NIST CPE","tags":["endpoints"]}},"/v3/entitlements":{"get":{"description":"Retrieve entitlements for the current user","operationId":"entitlements_get","responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/models.Entitlements"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Retrieve user entitlements","tags":["endpoints"]}},"/v3/index":{"get":{"description":"Return a list of available indexes with endpoint links that the user has access to","operationId":"index_get","responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.Response-array_params_IndexList"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"oneOf":[{"type":"string"},{"type":"string"}]}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return a list of available indexes with endpoint links","tags":["endpoints"]}},"/v3/index/7zip":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the 7zip index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 7Zip Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/7zip?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/7zip?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_7zip_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SevenZip-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"7zip\"","tags":["indices"]}},"/v3/index/a10":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the a10 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** A10 Networks Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/a10?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/a10?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_a10_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_A10-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"a10\"","tags":["indices"]}},"/v3/index/abb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the abb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ABB Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/abb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/abb?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_abb_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ABBAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"abb\"","tags":["indices"]}},"/v3/index/abbott":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the abbott index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Abbott Product Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/abbott?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/abbott?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_abbott_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Abbott-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"abbott\"","tags":["indices"]}},"/v3/index/absolute":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the absolute index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Absolute Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/absolute?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/absolute?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_absolute_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Absolute-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"absolute\"","tags":["indices"]}},"/v3/index/acronis":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the acronis index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Acronis Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/acronis?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/acronis?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_acronis_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Acronis-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"acronis\"","tags":["indices"]}},"/v3/index/adobe":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the adobe index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Adobe Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/adobe?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/adobe?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_adobe_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AdobeAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"adobe\"","tags":["indices"]}},"/v3/index/advantech":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the advantech index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Advantech Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/advantech?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/advantech?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_advantech_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Advantech-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"advantech\"","tags":["indices"]}},"/v3/index/advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/advisories?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_advisories_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AdvisoryRecord-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"advisories\"","tags":["indices"]}},"/v3/index/aix":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the aix index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AIX Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/aix?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/aix?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_aix_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AIX-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"aix\"","tags":["indices"]}},"/v3/index/aleph-research":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the aleph-research index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Aleph Research Vulnerability Reports\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/aleph-research?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/aleph-research?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_aleph-research_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AlephResearch-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"aleph-research\"","tags":["indices"]}},"/v3/index/alibaba-advs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the alibaba-advs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Alibaba Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/alibaba-advs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/alibaba-advs?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_alibaba-advs_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Alibaba-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"alibaba-advs\"","tags":["indices"]}},"/v3/index/alma":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the alma index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Alma Linux Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/alma?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/alma?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_alma_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AlmaLinuxUpdate-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"alma\"","tags":["indices"]}},"/v3/index/alpine":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the alpine index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Alpine Linux Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/alpine?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/alpine?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_alpine_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AlpineLinuxSecDB-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"alpine\"","tags":["indices"]}},"/v3/index/alpine-purls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the alpine-purls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Alpine Purls\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/alpine-purls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/alpine-purls?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_alpine-purls_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"alpine-purls\"","tags":["indices"]}},"/v3/index/amazon":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the amazon index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Amazon Linux Security Center\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/amazon?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/amazon?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_amazon_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Update-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"amazon\"","tags":["indices"]}},"/v3/index/amazon-cve":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the amazon-cve index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Amazon CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/amazon-cve?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/amazon-cve?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_amazon-cve_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AmazonCVE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"amazon-cve\"","tags":["indices"]}},"/v3/index/amd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the amd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AMD Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/amd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/amd?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_amd_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AMD-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"amd\"","tags":["indices"]}},"/v3/index/ami":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ami index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AMI Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ami?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ami?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ami_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AMI-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ami\"","tags":["indices"]}},"/v3/index/anchore-nvd-override":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the anchore-nvd-override index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Anchore NVD Data Overrides\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/anchore-nvd-override?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/anchore-nvd-override?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_anchore-nvd-override_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AnchoreNVDOverride-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"anchore-nvd-override\"","tags":["indices"]}},"/v3/index/android":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the android index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Android Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/android?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/android?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_android_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AndroidAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"android\"","tags":["indices"]}},"/v3/index/apache-activemq":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-activemq index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache ActiveMQ Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-activemq?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-activemq?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-activemq_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheActiveMQ-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-activemq\"","tags":["indices"]}},"/v3/index/apache-archiva":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-archiva index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Archiva Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-archiva?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-archiva?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-archiva_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheArchiva-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-archiva\"","tags":["indices"]}},"/v3/index/apache-arrow":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-arrow index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Arrow Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-arrow?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-arrow?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-arrow_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheArrow-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-arrow\"","tags":["indices"]}},"/v3/index/apache-camel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-camel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Camel Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-camel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-camel?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-camel_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheCamel-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-camel\"","tags":["indices"]}},"/v3/index/apache-commons":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-commons index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Commons Known Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-commons?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-commons?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-commons_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheCommons-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-commons\"","tags":["indices"]}},"/v3/index/apache-couchdb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-couchdb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache CouchDB Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-couchdb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-couchdb?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-couchdb_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheCouchDB-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-couchdb\"","tags":["indices"]}},"/v3/index/apache-flink":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-flink index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Flink Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-flink?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-flink?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-flink_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheFlink-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-flink\"","tags":["indices"]}},"/v3/index/apache-guacamole":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-guacamole index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Guacamole Security Reports\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-guacamole?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-guacamole?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-guacamole_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheGuacamole-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-guacamole\"","tags":["indices"]}},"/v3/index/apache-hadoop":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-hadoop index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Hadoop CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-hadoop?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-hadoop?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-hadoop_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheHadoop-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-hadoop\"","tags":["indices"]}},"/v3/index/apache-http":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-http index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache HTTP Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-http?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-http?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-http_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheHTTP-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-http\"","tags":["indices"]}},"/v3/index/apache-jspwiki":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-jspwiki index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache JSPWiki CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-jspwiki?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-jspwiki?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-jspwiki_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheJSPWiki-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-jspwiki\"","tags":["indices"]}},"/v3/index/apache-kafka":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-kafka index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Kafka Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-kafka?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-kafka?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-kafka_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheKafka-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-kafka\"","tags":["indices"]}},"/v3/index/apache-loggingservices":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-loggingservices index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Logging Services Known Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-loggingservices?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-loggingservices?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-loggingservices_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheLoggingServices-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-loggingservices\"","tags":["indices"]}},"/v3/index/apache-nifi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-nifi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache NiFi Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-nifi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-nifi?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-nifi_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheNiFi-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-nifi\"","tags":["indices"]}},"/v3/index/apache-ofbiz":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-ofbiz index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache OFBiz Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-ofbiz?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-ofbiz?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-ofbiz_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheOFBiz-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-ofbiz\"","tags":["indices"]}},"/v3/index/apache-openmeetings":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-openmeetings index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache OpenMeetings Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-openmeetings?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-openmeetings?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-openmeetings_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheOpenMeetings-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-openmeetings\"","tags":["indices"]}},"/v3/index/apache-openoffice":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-openoffice index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache OpenOffice Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-openoffice?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-openoffice?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-openoffice_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheOpenOffice-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-openoffice\"","tags":["indices"]}},"/v3/index/apache-pulsar":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-pulsar index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Pulsar Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-pulsar?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-pulsar?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-pulsar_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApachePulsar-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-pulsar\"","tags":["indices"]}},"/v3/index/apache-shiro":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-shiro index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Shiro Vulnerability Reports\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-shiro?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-shiro?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-shiro_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheShiro-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-shiro\"","tags":["indices"]}},"/v3/index/apache-spark":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-spark index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Spark Known Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-spark?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-spark?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-spark_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheSpark-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-spark\"","tags":["indices"]}},"/v3/index/apache-struts":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-struts index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Struts Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-struts?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-struts?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-struts_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheStruts-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-struts\"","tags":["indices"]}},"/v3/index/apache-subversion":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-subversion index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Subversion Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-subversion?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-subversion?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-subversion_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheSubversion-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-subversion\"","tags":["indices"]}},"/v3/index/apache-superset":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-superset index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Superset CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-superset?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-superset?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-superset_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheSuperset-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-superset\"","tags":["indices"]}},"/v3/index/apache-tomcat":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-tomcat index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Tomcat Security Vunlnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-tomcat?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-tomcat?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-tomcat_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheTomcat-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-tomcat\"","tags":["indices"]}},"/v3/index/apache-zookeeper":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-zookeeper index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache ZooKeeper Vulnerability Reports\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-zookeeper?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-zookeeper?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-zookeeper_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheZooKeeper-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-zookeeper\"","tags":["indices"]}},"/v3/index/appcheck":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the appcheck index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AppCheck Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/appcheck?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/appcheck?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_appcheck_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AppCheck-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"appcheck\"","tags":["indices"]}},"/v3/index/appgate":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the appgate index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Appgate SDP Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/appgate?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/appgate?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_appgate_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Appgate-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"appgate\"","tags":["indices"]}},"/v3/index/apple":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apple index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apple Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apple?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apple?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apple_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AppleAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apple\"","tags":["indices"]}},"/v3/index/arch":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the arch index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Arch Linux\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/arch?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/arch?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_arch_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ArchIssue-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"arch\"","tags":["indices"]}},"/v3/index/arista":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the arista index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Arista Networks Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/arista?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/arista?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_arista_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Arista-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"arista\"","tags":["indices"]}},"/v3/index/aruba":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the aruba index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Aruba Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/aruba?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/aruba?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_aruba_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Aruba-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"aruba\"","tags":["indices"]}},"/v3/index/asrg":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the asrg index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ASRG Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/asrg?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/asrg?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_asrg_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ASRG-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"asrg\"","tags":["indices"]}},"/v3/index/assetnote":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the assetnote index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AssetNote Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/assetnote?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/assetnote?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_assetnote_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AssetNote-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"assetnote\"","tags":["indices"]}},"/v3/index/asterisk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the asterisk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Asterisk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/asterisk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/asterisk?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_asterisk_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Asterisk-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"asterisk\"","tags":["indices"]}},"/v3/index/astra":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the astra index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Astra Linux Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/astra?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/astra?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_astra_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Astra-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"astra\"","tags":["indices"]}},"/v3/index/asus":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the asus index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ASUSTek Computer Inc.\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/asus?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/asus?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_asus_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Asus-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"asus\"","tags":["indices"]}},"/v3/index/atlassian":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the atlassian index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Atlassian Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/atlassian?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/atlassian?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_atlassian_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AtlassianAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"atlassian\"","tags":["indices"]}},"/v3/index/atlassian-vulns":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the atlassian-vulns index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Atlassian Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/atlassian-vulns?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/atlassian-vulns?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_atlassian-vulns_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AtlassianVuln-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"atlassian-vulns\"","tags":["indices"]}},"/v3/index/atredis":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the atredis index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Atredis Partners Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/atredis?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/atredis?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_atredis_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Atredis-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"atredis\"","tags":["indices"]}},"/v3/index/audiocodes":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the audiocodes index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AudioCodes Product Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/audiocodes?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/audiocodes?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_audiocodes_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Audiocodes-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"audiocodes\"","tags":["indices"]}},"/v3/index/auscert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the auscert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AusCERT Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/auscert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/auscert?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_auscert_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AusCert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"auscert\"","tags":["indices"]}},"/v3/index/autodesk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the autodesk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Autodesk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/autodesk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/autodesk?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_autodesk_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Autodesk-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"autodesk\"","tags":["indices"]}},"/v3/index/avaya":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the avaya index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Avaya Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/avaya?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/avaya?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_avaya_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Avaya-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"avaya\"","tags":["indices"]}},"/v3/index/aveva":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the aveva index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AVEVA Group Limited\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/aveva?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/aveva?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_aveva_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AVEVAAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"aveva\"","tags":["indices"]}},"/v3/index/avidml-advs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the avidml-advs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AI Vulnerability Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/avidml-advs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/avidml-advs?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_avidml-advs_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AVIDMLAdvs-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"avidml-advs\"","tags":["indices"]}},"/v3/index/avigilon":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the avigilon index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Avigilon Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/avigilon?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/avigilon?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_avigilon_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Avigilon-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"avigilon\"","tags":["indices"]}},"/v3/index/aws":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the aws index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AWS Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/aws?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/aws?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_aws_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AWS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"aws\"","tags":["indices"]}},"/v3/index/axis":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the axis index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Axis OS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/axis?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/axis?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_axis_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Axis-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"axis\"","tags":["indices"]}},"/v3/index/azul":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the azul index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Azul Common Vulnerabilities and Exposures\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/azul?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/azul?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_azul_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Azul-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"azul\"","tags":["indices"]}},"/v3/index/bandr":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bandr index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** B\u0026R Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bandr?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bandr?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_bandr_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Bandr-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"bandr\"","tags":["indices"]}},"/v3/index/baxter":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the baxter index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Baxter Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/baxter?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/baxter?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_baxter_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BaxterAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"baxter\"","tags":["indices"]}},"/v3/index/bbraun":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bbraun index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** B. Braun Medical Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bbraun?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bbraun?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_bbraun_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BBraunAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"bbraun\"","tags":["indices"]}},"/v3/index/bd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Becton Dickinson Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bd?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_bd_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BectonDickinsonAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"bd\"","tags":["indices"]}},"/v3/index/bdu":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bdu index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** BDU Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bdu?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bdu?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_bdu_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BDUAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"bdu\"","tags":["indices"]}},"/v3/index/beckhoff":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the beckhoff index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Beckhoff Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/beckhoff?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/beckhoff?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_beckhoff_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BeckhoffAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"beckhoff\"","tags":["indices"]}},"/v3/index/beckman-coulter":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the beckman-coulter index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Beckman Coulter Product Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/beckman-coulter?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/beckman-coulter?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_beckman-coulter_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BeckmanCoulter-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"beckman-coulter\"","tags":["indices"]}},"/v3/index/belden":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the belden index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Belden Security Bulletins Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/belden?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/belden?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_belden_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BeldenAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"belden\"","tags":["indices"]}},"/v3/index/beyond-trust":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the beyond-trust index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Beyond Trust Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/beyond-trust?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/beyond-trust?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_beyond-trust_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BeyondTrust-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"beyond-trust\"","tags":["indices"]}},"/v3/index/binarly":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the binarly index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Binarly Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/binarly?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/binarly?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_binarly_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Binarly-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"binarly\"","tags":["indices"]}},"/v3/index/bitdefender":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bitdefender index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Bitdefender Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bitdefender?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bitdefender?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_bitdefender_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BitDefender-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"bitdefender\"","tags":["indices"]}},"/v3/index/blackberry":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the blackberry index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** BlackBerry Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/blackberry?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/blackberry?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_blackberry_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BlackBerry-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"blackberry\"","tags":["indices"]}},"/v3/index/bls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Black Lantern Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bls?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_bls_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BLS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"bls\"","tags":["indices"]}},"/v3/index/bosch":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bosch index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Bosch Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bosch?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bosch?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_bosch_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BoschAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"bosch\"","tags":["indices"]}},"/v3/index/boston-scientific":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the boston-scientific index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Boston Scientific Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/boston-scientific?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/boston-scientific?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_boston-scientific_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BostonScientificAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"boston-scientific\"","tags":["indices"]}},"/v3/index/botnets":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the botnets index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Botnets\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/botnets?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/botnets?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_botnets_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Botnet-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"botnets\"","tags":["indices"]}},"/v3/index/ca-cyber-centre":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ca-cyber-centre index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Canadian Centre for Cyber Security Alerts and Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ca-cyber-centre?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ca-cyber-centre?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ca-cyber-centre_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CACyberCentreAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ca-cyber-centre\"","tags":["indices"]}},"/v3/index/canvas":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the canvas index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CANVAS Exploit Packs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/canvas?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/canvas?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_canvas_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CanvasExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"canvas\"","tags":["indices"]}},"/v3/index/carestream":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the carestream index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Carestream Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/carestream?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/carestream?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_carestream_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CarestreamAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"carestream\"","tags":["indices"]}},"/v3/index/cargo":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cargo index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cargo (Rust) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cargo?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cargo?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cargo_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cargo\"","tags":["indices"]}},"/v3/index/carrier":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the carrier index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Carrier Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/carrier?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/carrier?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_carrier_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Carrier-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"carrier\"","tags":["indices"]}},"/v3/index/cbl-mariner":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cbl-mariner index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CBL-Mariner Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cbl-mariner?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cbl-mariner?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cbl-mariner_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CBLMariner-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cbl-mariner\"","tags":["indices"]}},"/v3/index/centos":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the centos index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CentOS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/centos?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/centos?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_centos_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CESA-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"centos\"","tags":["indices"]}},"/v3/index/cert-be":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cert-be index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cert BE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cert-be?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cert-be?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cert-be_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CertBE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cert-be\"","tags":["indices"]}},"/v3/index/cert-in":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cert-in index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CERT IN Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cert-in?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cert-in?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cert-in_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CertIN-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cert-in\"","tags":["indices"]}},"/v3/index/cert-ir-security-alerts":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cert-ir-security-alerts index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cert IR Security Warnings\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cert-ir-security-alerts?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cert-ir-security-alerts?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cert-ir-security-alerts_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CertIRSecurityAlert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cert-ir-security-alerts\"","tags":["indices"]}},"/v3/index/cert-se":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cert-se index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cert SE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cert-se?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cert-se?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cert-se_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CertSE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cert-se\"","tags":["indices"]}},"/v3/index/cert-ua":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cert-ua index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cert UA Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cert-ua?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cert-ua?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cert-ua_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CertUA-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cert-ua\"","tags":["indices"]}},"/v3/index/certeu":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the certeu index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CERT-EU The Computer Emergency Response Team for the EU Institutions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/certeu?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/certeu?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_certeu_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CERTEUAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"certeu\"","tags":["indices"]}},"/v3/index/certfr":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the certfr index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cert FR Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/certfr?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/certfr?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_certfr_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CertFRAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"certfr\"","tags":["indices"]}},"/v3/index/chainguard":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the chainguard index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ChainGuard Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/chainguard?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/chainguard?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_chainguard_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ChainGuard-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"chainguard\"","tags":["indices"]}},"/v3/index/checkpoint":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the checkpoint index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CheckPoint Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/checkpoint?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/checkpoint?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_checkpoint_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CheckPoint-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"checkpoint\"","tags":["indices"]}},"/v3/index/chrome":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the chrome index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Google Chrome Release Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/chrome?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/chrome?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_chrome_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Chrome-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"chrome\"","tags":["indices"]}},"/v3/index/ciena":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ciena index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ciena\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ciena?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ciena?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ciena_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Ciena-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ciena\"","tags":["indices"]}},"/v3/index/cisa-alerts":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisa-alerts index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CISA Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisa-alerts?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisa-alerts?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cisa-alerts_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CISAAlert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cisa-alerts\"","tags":["indices"]}},"/v3/index/cisa-csaf":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisa-csaf index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CISA Security Advisories - CSAF\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisa-csaf?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisa-csaf?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cisa-csaf_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CisaCsafAdv-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cisa-csaf\"","tags":["indices"]}},"/v3/index/cisa-kev":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisa-kev index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CISA KEV (Known Exploited Vulnerabilities)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisa-kev?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisa-kev?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cisa-kev_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_KEVCatalogVulnerability-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cisa-kev\"","tags":["indices"]}},"/v3/index/cisco":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisco index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cisco Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisco?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisco?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cisco_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CiscoAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cisco\"","tags":["indices"]}},"/v3/index/cisco-csaf":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisco-csaf index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cisco CSAF\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisco-csaf?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisco-csaf?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cisco-csaf_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CiscoCSAF-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cisco-csaf\"","tags":["indices"]}},"/v3/index/cisco-known-good-values":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisco-known-good-values index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cisco Known Good Values\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisco-known-good-values?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisco-known-good-values?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cisco-known-good-values_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CiscoKnownGoodValue-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cisco-known-good-values\"","tags":["indices"]}},"/v3/index/cisco-talos":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisco-talos index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cisco Talos Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisco-talos?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisco-talos?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cisco-talos_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TalosAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cisco-talos\"","tags":["indices"]}},"/v3/index/citrix":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the citrix index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Citrix Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/citrix?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/citrix?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_citrix_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CitrixAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"citrix\"","tags":["indices"]}},"/v3/index/claroty":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the claroty index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Team 82: The Claroty Research Team\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/claroty?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/claroty?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_claroty_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ClarotyVulnerability-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"claroty\"","tags":["indices"]}},"/v3/index/cloudbees":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cloudbees index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CloudBees Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cloudbees?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cloudbees?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cloudbees_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CloudBees-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cloudbees\"","tags":["indices"]}},"/v3/index/cloudvulndb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cloudvulndb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CloudVulnDB\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cloudvulndb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cloudvulndb?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cloudvulndb_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CloudVulnDBAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cloudvulndb\"","tags":["indices"]}},"/v3/index/cnnvd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cnnvd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** The Chinese National Vulnerability Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cnnvd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cnnvd?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cnnvd_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CNNVDEntryJSON-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cnnvd\"","tags":["indices"]}},"/v3/index/cnvd-bulletins":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cnvd-bulletins index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CNVD Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cnvd-bulletins?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cnvd-bulletins?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cnvd-bulletins_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CNVDBulletin-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cnvd-bulletins\"","tags":["indices"]}},"/v3/index/cnvd-flaws":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cnvd-flaws index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CNVD Flaws\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cnvd-flaws?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cnvd-flaws?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cnvd-flaws_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CNVDFlaw-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cnvd-flaws\"","tags":["indices"]}},"/v3/index/cocoapods":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cocoapods index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CocoaPods packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cocoapods?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cocoapods?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cocoapods_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cocoapods\"","tags":["indices"]}},"/v3/index/codesys":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the codesys index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Codesys Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/codesys?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/codesys?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_codesys_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CodesysAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"codesys\"","tags":["indices"]}},"/v3/index/commvault":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the commvault index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Commvault Cloud Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/commvault?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/commvault?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_commvault_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CommVault-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"commvault\"","tags":["indices"]}},"/v3/index/compass-security":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the compass-security index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Compass Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/compass-security?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/compass-security?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_compass-security_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CompassSecurity-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"compass-security\"","tags":["indices"]}},"/v3/index/composer":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the composer index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PHP Composer packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/composer?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/composer?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_composer_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"composer\"","tags":["indices"]}},"/v3/index/conan":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the conan index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** C/C++ packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/conan?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/conan?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_conan_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"conan\"","tags":["indices"]}},"/v3/index/coreimpact":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the coreimpact index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Core Impact\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/coreimpact?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/coreimpact?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_coreimpact_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CoreImpactExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"coreimpact\"","tags":["indices"]}},"/v3/index/cpe-vulnerable":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cpe-vulnerable index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Unrolled VulnCheck CPEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cpe-vulnerable?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cpe-vulnerable?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cpe-vulnerable_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VCVulnerableCPEs-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cpe-vulnerable\"","tags":["indices"]}},"/v3/index/crestron":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the crestron index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Crestron Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/crestron?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/crestron?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_crestron_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Crestron-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"crestron\"","tags":["indices"]}},"/v3/index/crowdsec":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the crowdsec index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CrowdSec Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/crowdsec?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/crowdsec?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_crowdsec_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CrowdSec-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"crowdsec\"","tags":["indices"]}},"/v3/index/curl":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the curl index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Curl CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/curl?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/curl?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_curl_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Curl-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"curl\"","tags":["indices"]}},"/v3/index/cwe":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cwe index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Common Weakness Enumeration Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cwe?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cwe?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cwe_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_CWE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cwe\"","tags":["indices"]}},"/v3/index/dahua":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dahua index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Dahua Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dahua?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dahua?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_dahua_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Dahua-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"dahua\"","tags":["indices"]}},"/v3/index/danfoss":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the danfoss index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Danfoss Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/danfoss?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/danfoss?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_danfoss_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Danfoss-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"danfoss\"","tags":["indices"]}},"/v3/index/dassault":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dassault index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Dassault Systèmes Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dassault?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dassault?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_dassault_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Dassault-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"dassault\"","tags":["indices"]}},"/v3/index/debian":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the debian index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Debian Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/debian?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/debian?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_debian_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VulnerableDebianPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"debian\"","tags":["indices"]}},"/v3/index/debian-dsa":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the debian-dsa index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Debian Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/debian-dsa?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/debian-dsa?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_debian-dsa_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_DebianSecurityAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"debian-dsa\"","tags":["indices"]}},"/v3/index/debian-packages":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the debian-packages index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Debian Packages\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/debian-packages?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/debian-packages?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_debian-packages_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_DistroPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"debian-packages\"","tags":["indices"]}},"/v3/index/debian-purls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the debian-purls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Debian PURLs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/debian-purls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/debian-purls?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_debian-purls_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"debian-purls\"","tags":["indices"]}},"/v3/index/dell":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dell index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Dell Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dell?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dell?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_dell_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Dell-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"dell\"","tags":["indices"]}},"/v3/index/delta":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the delta index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Delta Controls Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/delta?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/delta?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_delta_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_DeltaAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"delta\"","tags":["indices"]}},"/v3/index/dfn-cert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dfn-cert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** DFN-CERT Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dfn-cert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dfn-cert?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_dfn-cert_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_DFNCert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"dfn-cert\"","tags":["indices"]}},"/v3/index/django":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the django index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Django Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/django?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/django?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_django_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Django-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"django\"","tags":["indices"]}},"/v3/index/dlink":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dlink index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** DLink Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dlink?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dlink?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_dlink_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_DLink-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"dlink\"","tags":["indices"]}},"/v3/index/dnn":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dnn index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** DNN Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dnn?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dnn?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_dnn_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_DNN-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"dnn\"","tags":["indices"]}},"/v3/index/dotcms":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dotcms index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** DotCMS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dotcms?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dotcms?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_dotcms_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_DotCMS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"dotcms\"","tags":["indices"]}},"/v3/index/dragos":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dragos index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Dragos Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dragos?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dragos?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_dragos_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_DragosAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"dragos\"","tags":["indices"]}},"/v3/index/draytek":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the draytek index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** DrayTek Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/draytek?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/draytek?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_draytek_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Draytek-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"draytek\"","tags":["indices"]}},"/v3/index/drupal":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the drupal index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Drupal Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/drupal?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/drupal?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_drupal_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Drupal-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"drupal\"","tags":["indices"]}},"/v3/index/eaton":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the eaton index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Eaton Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/eaton?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/eaton?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_eaton_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_EatonAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"eaton\"","tags":["indices"]}},"/v3/index/elastic":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the elastic index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Elastic Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/elastic?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/elastic?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_elastic_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Elastic-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"elastic\"","tags":["indices"]}},"/v3/index/elspec":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the elspec index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Elspec Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/elspec?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/elspec?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_elspec_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Elspec-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"elspec\"","tags":["indices"]}},"/v3/index/emerging-threats-snort":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the emerging-threats-snort index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Emerging Threats Snort\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/emerging-threats-snort?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/emerging-threats-snort?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_emerging-threats-snort_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_EmergingThreatsSnort-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"emerging-threats-snort\"","tags":["indices"]}},"/v3/index/emerson":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the emerson index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Emerson Cyber Security Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/emerson?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/emerson?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_emerson_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_EmersonAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"emerson\"","tags":["indices"]}},"/v3/index/endoflife":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the endoflife index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** End Of Life\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/endoflife?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/endoflife?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_endoflife_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_EndOfLife-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"endoflife\"","tags":["indices"]}},"/v3/index/endress":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the endress index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Endress \u0026 Hauser Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/endress?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/endress?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_endress_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Endress-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"endress\"","tags":["indices"]}},"/v3/index/eol":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the eol index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck EOL Coverage\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/eol?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/eol?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_eol_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_EOLReleaseData-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"eol\"","tags":["indices"]}},"/v3/index/eol-alibaba":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the eol-alibaba index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Alibaba EOL\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/eol-alibaba?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/eol-alibaba?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_eol-alibaba_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_EOLAlibaba-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"eol-alibaba\"","tags":["indices"]}},"/v3/index/eol-microsoft":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the eol-microsoft index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Microsoft EOL\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/eol-microsoft?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/eol-microsoft?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_eol-microsoft_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_EOLMicrosoft-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"eol-microsoft\"","tags":["indices"]}},"/v3/index/epss":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the epss index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** EPSS Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/epss?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/epss?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_epss_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_EPSSData-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"epss\"","tags":["indices"]}},"/v3/index/euvd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the euvd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** European Union Vulnerability Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/euvd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/euvd?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_euvd_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_EUVD-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"euvd\"","tags":["indices"]}},"/v3/index/exodus-intel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the exodus-intel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Exodus Intelligence Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/exodus-intel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/exodus-intel?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_exodus-intel_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ExodusIntel-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"exodus-intel\"","tags":["indices"]}},"/v3/index/exploit-chains":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the exploit-chains index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Exploit Chains\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/exploit-chains?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/exploit-chains?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_exploit-chains_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_ExploitChain-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"exploit-chains\"","tags":["indices"]}},"/v3/index/exploitdb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the exploitdb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** The Exploit Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/exploitdb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/exploitdb?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_exploitdb_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ExploitDBExploitv2-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"exploitdb\"","tags":["indices"]}},"/v3/index/exploits":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the exploits index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Exploit Intelligence Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/exploits?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/exploits?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_exploits_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_ExploitV3Result-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"exploits\"","tags":["indices"]}},"/v3/index/exploits-changelog":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the exploits-changelog index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Changelog for VC Exploits Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/exploits-changelog?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/exploits-changelog?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_exploits-changelog_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_ExploitsChangelog-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"exploits-changelog\"","tags":["indices"]}},"/v3/index/f-secure":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the f-secure index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** F-Secure Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/f-secure?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/f-secure?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_f-secure_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_FSecure-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"f-secure\"","tags":["indices"]}},"/v3/index/f5":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the f5 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** F5 Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/f5?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/f5?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_f5_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_F5-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"f5\"","tags":["indices"]}},"/v3/index/fanuc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fanuc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Fanuc Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fanuc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fanuc?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_fanuc_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Fanuc-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"fanuc\"","tags":["indices"]}},"/v3/index/fastly":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fastly index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Fastly Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fastly?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fastly?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_fastly_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Fastly-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"fastly\"","tags":["indices"]}},"/v3/index/fedora":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fedora index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Fedora Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fedora?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fedora?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_fedora_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Update-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"fedora\"","tags":["indices"]}},"/v3/index/festo":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the festo index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Festo Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/festo?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/festo?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_festo_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Festo-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"festo\"","tags":["indices"]}},"/v3/index/filecloud":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the filecloud index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** FileCloud Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/filecloud?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/filecloud?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_filecloud_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_FileCloud-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"filecloud\"","tags":["indices"]}},"/v3/index/filezilla":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the filezilla index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** FileZilla Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/filezilla?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/filezilla?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_filezilla_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_FileZilla-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"filezilla\"","tags":["indices"]}},"/v3/index/flatt-security":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the flatt-security index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Flatt Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/flatt-security?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/flatt-security?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_flatt-security_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_FlattSecurity-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"flatt-security\"","tags":["indices"]}},"/v3/index/forgerock":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the forgerock index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ForgeRock Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/forgerock?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/forgerock?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_forgerock_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ForgeRock-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"forgerock\"","tags":["indices"]}},"/v3/index/fortinet":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fortinet index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** FortiGuard Fortinet\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fortinet?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fortinet?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_fortinet_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_FortinetAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"fortinet\"","tags":["indices"]}},"/v3/index/fortinet-ips":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fortinet-ips index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Fortinet Labs Threat Encyclopedia\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fortinet-ips?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fortinet-ips?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_fortinet-ips_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_FortinetIPS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"fortinet-ips\"","tags":["indices"]}},"/v3/index/foxit":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the foxit index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Foxit Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/foxit?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/foxit?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_foxit_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Foxit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"foxit\"","tags":["indices"]}},"/v3/index/freebsd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the freebsd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** FreeBSD Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/freebsd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/freebsd?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_freebsd_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Advisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"freebsd\"","tags":["indices"]}},"/v3/index/fresenius":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fresenius index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Fresenius Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fresenius?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fresenius?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_fresenius_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Fresenius-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"fresenius\"","tags":["indices"]}},"/v3/index/gallagher":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gallagher index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Gallagher Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gallagher?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gallagher?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_gallagher_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Gallagher-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"gallagher\"","tags":["indices"]}},"/v3/index/gcp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gcp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GCP Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gcp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gcp?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_gcp_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GCP-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"gcp\"","tags":["indices"]}},"/v3/index/ge-gas":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ge-gas index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GE Gas Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ge-gas?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ge-gas?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ge-gas_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GEGas-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ge-gas\"","tags":["indices"]}},"/v3/index/ge-healthcare":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ge-healthcare index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GE Healthcare Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ge-healthcare?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ge-healthcare?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ge-healthcare_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GEHealthcareAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ge-healthcare\"","tags":["indices"]}},"/v3/index/gem":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gem index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ruby (gem) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gem?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gem?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_gem_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"gem\"","tags":["indices"]}},"/v3/index/gen":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gen index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Gen Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gen?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gen?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_gen_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Gen-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"gen\"","tags":["indices"]}},"/v3/index/genetec":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the genetec index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Genetec Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/genetec?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/genetec?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_genetec_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Genetec-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"genetec\"","tags":["indices"]}},"/v3/index/ghsa":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ghsa index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GHSA\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ghsa?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ghsa?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ghsa_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GHSA-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ghsa\"","tags":["indices"]}},"/v3/index/gigabyte":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gigabyte index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GIGABYTE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gigabyte?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gigabyte?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_gigabyte_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Gigabyte-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"gigabyte\"","tags":["indices"]}},"/v3/index/gitee-exploits":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gitee-exploits index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Gitee Exploits\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gitee-exploits?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gitee-exploits?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_gitee-exploits_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GiteeExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"gitee-exploits\"","tags":["indices"]}},"/v3/index/github-exploits":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the github-exploits index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GitHub Exploits\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/github-exploits?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/github-exploits?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_github-exploits_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GitHubExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"github-exploits\"","tags":["indices"]}},"/v3/index/github-security-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the github-security-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Github Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/github-security-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/github-security-advisories?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_github-security-advisories_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GHAdvisoryJSONLean-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"github-security-advisories\"","tags":["indices"]}},"/v3/index/gitlab-advisories-community":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gitlab-advisories-community index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GitLab Advisory Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gitlab-advisories-community?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gitlab-advisories-community?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_gitlab-advisories-community_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GitlabAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"gitlab-advisories-community\"","tags":["indices"]}},"/v3/index/gitlab-exploits":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gitlab-exploits index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GitLab Exploits\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gitlab-exploits?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gitlab-exploits?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_gitlab-exploits_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GitLabExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"gitlab-exploits\"","tags":["indices"]}},"/v3/index/glibc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the glibc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Glibc Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/glibc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/glibc?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_glibc_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Glibc-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"glibc\"","tags":["indices"]}},"/v3/index/gmo-cybersecurity":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gmo-cybersecurity index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GMO Cybersecurity Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gmo-cybersecurity?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gmo-cybersecurity?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_gmo-cybersecurity_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GMOCyberSecurity-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"gmo-cybersecurity\"","tags":["indices"]}},"/v3/index/gnutls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gnutls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GnuTLS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gnutls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gnutls?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_gnutls_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GnuTLS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"gnutls\"","tags":["indices"]}},"/v3/index/go-vulndb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the go-vulndb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Go Vulnerability Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/go-vulndb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/go-vulndb?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_go-vulndb_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GoVulnJSON-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"go-vulndb\"","tags":["indices"]}},"/v3/index/golang":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the golang index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Golang packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/golang?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/golang?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_golang_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"golang\"","tags":["indices"]}},"/v3/index/google-0day-itw":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the google-0day-itw index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Project Zero In the Wild Exploits\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/google-0day-itw?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/google-0day-itw?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_google-0day-itw_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ITWExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"google-0day-itw\"","tags":["indices"]}},"/v3/index/google-container-optimized-os":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the google-container-optimized-os index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Container OS Release Notes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/google-container-optimized-os?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/google-container-optimized-os?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_google-container-optimized-os_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ContainerOS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"google-container-optimized-os\"","tags":["indices"]}},"/v3/index/grafana":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the grafana index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Grafana Labs Security Fixes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/grafana?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/grafana?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_grafana_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Grafana-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"grafana\"","tags":["indices"]}},"/v3/index/greynoise-metadata":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the greynoise-metadata index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GreyNoise Metadata\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/greynoise-metadata?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/greynoise-metadata?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_greynoise-metadata_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GreyNoiseDetection-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"greynoise-metadata\"","tags":["indices"]}},"/v3/index/hackage":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hackage index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hackage (Haskell) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hackage?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hackage?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hackage_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hackage\"","tags":["indices"]}},"/v3/index/hacktivity":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hacktivity index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hackerone Hacktivity\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hacktivity?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hacktivity?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hacktivity_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Hacktivity-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hacktivity\"","tags":["indices"]}},"/v3/index/harmonyos":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the harmonyos index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HarmonyOS Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/harmonyos?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/harmonyos?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_harmonyos_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HarmonyOS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"harmonyos\"","tags":["indices"]}},"/v3/index/hashicorp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hashicorp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HashiCorp Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hashicorp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hashicorp?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hashicorp_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HashiCorp-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hashicorp\"","tags":["indices"]}},"/v3/index/haskell-sadb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the haskell-sadb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Haskell Security Advisory DB\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/haskell-sadb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/haskell-sadb?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_haskell-sadb_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HaskellSADBAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"haskell-sadb\"","tags":["indices"]}},"/v3/index/hcl":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hcl index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HCLSoftware Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hcl?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hcl?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hcl_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HCL-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hcl\"","tags":["indices"]}},"/v3/index/hex":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hex index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hex (Erlang) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hex?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hex?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hex_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hex\"","tags":["indices"]}},"/v3/index/hikvision":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hikvision index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hikvision Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hikvision?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hikvision?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hikvision_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HIKVision-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hikvision\"","tags":["indices"]}},"/v3/index/hillrom":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hillrom index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hillrom Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hillrom?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hillrom?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hillrom_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HillromAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hillrom\"","tags":["indices"]}},"/v3/index/hitachi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hitachi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hitachi Software Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hitachi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hitachi?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hitachi_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Hitachi-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hitachi\"","tags":["indices"]}},"/v3/index/hitachi-energy":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hitachi-energy index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hitachi Energy Cybersecurity Advisories and Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hitachi-energy?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hitachi-energy?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hitachi-energy_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HitachiEnergy-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hitachi-energy\"","tags":["indices"]}},"/v3/index/hkcert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hkcert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hong Kong CERT Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hkcert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hkcert?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hkcert_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HKCert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hkcert\"","tags":["indices"]}},"/v3/index/hms":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hms index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HMS (Hardware Meets Software) Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hms?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hms?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hms_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HMS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hms\"","tags":["indices"]}},"/v3/index/honeywell":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the honeywell index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Honeywell Cyber Security Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/honeywell?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/honeywell?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_honeywell_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Honeywell-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"honeywell\"","tags":["indices"]}},"/v3/index/hp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HP Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hp?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hp_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HP-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hp\"","tags":["indices"]}},"/v3/index/hpe":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hpe index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HPE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hpe?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hpe?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hpe_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HPE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hpe\"","tags":["indices"]}},"/v3/index/huawei-euleros":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the huawei-euleros index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenEuler Operating System Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-euleros?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/huawei-euleros?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_huawei-euleros_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HuaweiEulerOS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"huawei-euleros\"","tags":["indices"]}},"/v3/index/huawei-ips":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the huawei-ips index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Huawei IPS Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-ips?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/huawei-ips?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_huawei-ips_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HuaweiIPS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"huawei-ips\"","tags":["indices"]}},"/v3/index/huawei-psirt":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the huawei-psirt index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Huawei Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-psirt?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/huawei-psirt?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_huawei-psirt_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Huawei-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"huawei-psirt\"","tags":["indices"]}},"/v3/index/iava":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the iava index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Information Assurance Vulnerability Alerts (IAVA)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/iava?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/iava?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_iava_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IAVA-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"iava\"","tags":["indices"]}},"/v3/index/ibm":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ibm index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** IBM Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ibm?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ibm?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ibm_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IBM-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ibm\"","tags":["indices"]}},"/v3/index/idemia":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the idemia index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Idemia Product Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/idemia?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/idemia?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_idemia_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Idemia-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"idemia\"","tags":["indices"]}},"/v3/index/igel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the igel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** IGEL Security Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/igel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/igel?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_igel_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Igel-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"igel\"","tags":["indices"]}},"/v3/index/il-alerts":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the il-alerts index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Gov.il Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/il-alerts?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/il-alerts?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_il-alerts_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IsraeliAlert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"il-alerts\"","tags":["indices"]}},"/v3/index/il-vulnerabilities":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the il-vulnerabilities index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Gov.il CVE Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/il-vulnerabilities?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/il-vulnerabilities?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_il-vulnerabilities_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IsraeliVulnerability-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"il-vulnerabilities\"","tags":["indices"]}},"/v3/index/incibe":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the incibe index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Incibe CERT Early Warnings\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/incibe?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/incibe?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_incibe_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IncibeAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"incibe\"","tags":["indices"]}},"/v3/index/initial-access":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the initial-access index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Initial Access Intelligence\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/initial-access?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_initial-access_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_InitialAccess-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"initial-access\"","tags":["indices"]}},"/v3/index/initial-access-git":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the initial-access-git index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Initial Access Intelligence Git Backup for Subscribers\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access-git?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/initial-access-git?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_initial-access-git_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_InitialAccess-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"initial-access-git\"","tags":["indices"]}},"/v3/index/intel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the intel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Intel® Product Security Center Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/intel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/intel?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_intel_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Intel-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"intel\"","tags":["indices"]}},"/v3/index/ipintel-10d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ipintel-10d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 10-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-10d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ipintel-10d?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ipintel-10d_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify an IPv4 or IPv6 CIDR","in":"query","name":"cidr","schema":{"type":"string"}},{"description":"Autonomous system number","in":"query","name":"asn","schema":{"type":"string"}},{"description":"Country name ISO-3166?? format","in":"query","name":"country","schema":{"type":"string"}},{"description":"Country code in ISO-3166?? format","in":"query","name":"country_code","schema":{"type":"string"}},{"description":"Record type","in":"query","name":"id","schema":{"type":"string"}},{"description":"Kind of IpIntel Finding","in":"query","name":"kind","schema":{"type":"string"}},{"description":"Match a string in the list of hostnames","in":"query","name":"hostname","schema":{"type":"string"}},{"description":"Search for a string in the field describing the finding","in":"query","name":"matches","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ipintel-10d\"","tags":["indices"]}},"/v3/index/ipintel-30d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ipintel-30d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 30-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-30d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ipintel-30d?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ipintel-30d_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify an IPv4 or IPv6 CIDR","in":"query","name":"cidr","schema":{"type":"string"}},{"description":"Autonomous system number","in":"query","name":"asn","schema":{"type":"string"}},{"description":"Country name ISO-3166?? format","in":"query","name":"country","schema":{"type":"string"}},{"description":"Country code in ISO-3166?? format","in":"query","name":"country_code","schema":{"type":"string"}},{"description":"Record type","in":"query","name":"id","schema":{"type":"string"}},{"description":"Kind of IpIntel Finding","in":"query","name":"kind","schema":{"type":"string"}},{"description":"Match a string in the list of hostnames","in":"query","name":"hostname","schema":{"type":"string"}},{"description":"Search for a string in the field describing the finding","in":"query","name":"matches","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ipintel-30d\"","tags":["indices"]}},"/v3/index/ipintel-3d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ipintel-3d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 3-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-3d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ipintel-3d?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ipintel-3d_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify an IPv4 or IPv6 CIDR","in":"query","name":"cidr","schema":{"type":"string"}},{"description":"Autonomous system number","in":"query","name":"asn","schema":{"type":"string"}},{"description":"Country name ISO-3166?? format","in":"query","name":"country","schema":{"type":"string"}},{"description":"Country code in ISO-3166?? format","in":"query","name":"country_code","schema":{"type":"string"}},{"description":"Record type","in":"query","name":"id","schema":{"type":"string"}},{"description":"Kind of IpIntel Finding","in":"query","name":"kind","schema":{"type":"string"}},{"description":"Match a string in the list of hostnames","in":"query","name":"hostname","schema":{"type":"string"}},{"description":"Search for a string in the field describing the finding","in":"query","name":"matches","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ipintel-3d\"","tags":["indices"]}},"/v3/index/ipintel-90d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ipintel-90d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 90-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-90d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ipintel-90d?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ipintel-90d_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify an IPv4 or IPv6 CIDR","in":"query","name":"cidr","schema":{"type":"string"}},{"description":"Autonomous system number","in":"query","name":"asn","schema":{"type":"string"}},{"description":"Country name ISO-3166?? format","in":"query","name":"country","schema":{"type":"string"}},{"description":"Country code in ISO-3166?? format","in":"query","name":"country_code","schema":{"type":"string"}},{"description":"Record type","in":"query","name":"id","schema":{"type":"string"}},{"description":"Kind of IpIntel Finding","in":"query","name":"kind","schema":{"type":"string"}},{"description":"Match a string in the list of hostnames","in":"query","name":"hostname","schema":{"type":"string"}},{"description":"Search for a string in the field describing the finding","in":"query","name":"matches","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ipintel-90d\"","tags":["indices"]}},"/v3/index/istio":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the istio index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Istio Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/istio?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/istio?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_istio_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Istio-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"istio\"","tags":["indices"]}},"/v3/index/ivanti":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ivanti index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ivanti Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ivanti?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ivanti_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Ivanti-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ivanti\"","tags":["indices"]}},"/v3/index/ivanti-rss":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ivanti-rss index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ivanti Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti-rss?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ivanti-rss?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ivanti-rss_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IvantiRSS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ivanti-rss\"","tags":["indices"]}},"/v3/index/jenkins":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jenkins index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Jenkins Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jenkins?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jenkins?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_jenkins_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Jenkins-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"jenkins\"","tags":["indices"]}},"/v3/index/jetbrains":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jetbrains index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** JetBrains Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jetbrains?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jetbrains?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_jetbrains_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_JetBrains-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"jetbrains\"","tags":["indices"]}},"/v3/index/jfrog":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jfrog index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** JFrog Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jfrog?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jfrog?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_jfrog_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_JFrog-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"jfrog\"","tags":["indices"]}},"/v3/index/jnj":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jnj index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Johnson \u0026 Johnson Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jnj?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jnj?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_jnj_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_JNJAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"jnj\"","tags":["indices"]}},"/v3/index/johnson-controls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the johnson-controls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Security Advisories - Johnson Controls\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/johnson-controls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/johnson-controls?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_johnson-controls_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_JohnsonControls-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"johnson-controls\"","tags":["indices"]}},"/v3/index/juniper":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the juniper index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Juniper Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/juniper?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/juniper?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_juniper_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Juniper-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"juniper\"","tags":["indices"]}},"/v3/index/jvn":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jvn index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Japan Vulnerability Notes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jvn?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jvn?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_jvn_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_JVN-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"jvn\"","tags":["indices"]}},"/v3/index/jvndb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jvndb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Japan Vulnerability Notes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jvndb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jvndb?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_jvndb_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_JVNAdvisoryItem-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"jvndb\"","tags":["indices"]}},"/v3/index/kaspersky-ics-cert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the kaspersky-ics-cert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Kaspersky ICS CERT\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/kaspersky-ics-cert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/kaspersky-ics-cert?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_kaspersky-ics-cert_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_KasperskyICSCERTAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"kaspersky-ics-cert\"","tags":["indices"]}},"/v3/index/korelogic":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the korelogic index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** KoreLogic Vulnerability Research and Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/korelogic?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/korelogic?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_korelogic_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_KoreLogic-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"korelogic\"","tags":["indices"]}},"/v3/index/krcert-security-notices":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the krcert-security-notices index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** KR-CERT Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-security-notices?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/krcert-security-notices?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_krcert-security-notices_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_KRCertAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"krcert-security-notices\"","tags":["indices"]}},"/v3/index/krcert-vulnerabilities":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the krcert-vulnerabilities index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** KR-CERT Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-vulnerabilities?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/krcert-vulnerabilities?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_krcert-vulnerabilities_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_KRCertAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"krcert-vulnerabilities\"","tags":["indices"]}},"/v3/index/kubernetes":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the kubernetes index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Kubernetes Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/kubernetes?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/kubernetes?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_kubernetes_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_K8S-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"kubernetes\"","tags":["indices"]}},"/v3/index/kunbus":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the kunbus index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** KunBus Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/kunbus?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/kunbus?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_kunbus_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Kunbus-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"kunbus\"","tags":["indices"]}},"/v3/index/lantronix":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the lantronix index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Lantronix Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/lantronix?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/lantronix?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_lantronix_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Lantronix-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"lantronix\"","tags":["indices"]}},"/v3/index/lenovo":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the lenovo index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Lenovo Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/lenovo?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/lenovo?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_lenovo_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Lenovo-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"lenovo\"","tags":["indices"]}},"/v3/index/lexmark":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the lexmark index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Lexmark Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/lexmark?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/lexmark?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_lexmark_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_LexmarkAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"lexmark\"","tags":["indices"]}},"/v3/index/lg":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the lg index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** LG Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/lg?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/lg?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_lg_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_LG-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"lg\"","tags":["indices"]}},"/v3/index/libre-office":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the libre-office index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Libre Office Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/libre-office?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/libre-office?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_libre-office_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_LibreOffice-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"libre-office\"","tags":["indices"]}},"/v3/index/linux":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the linux index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Linux Kernel Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/linux?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/linux?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_linux_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Linux-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"linux\"","tags":["indices"]}},"/v3/index/lol-advs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the lol-advs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Living Off the Land Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/lol-advs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/lol-advs?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_lol-advs_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_LolAdvs-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"lol-advs\"","tags":["indices"]}},"/v3/index/m-files":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the m-files index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** M-Files Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/m-files?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/m-files?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_m-files_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MFiles-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"m-files\"","tags":["indices"]}},"/v3/index/macert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the macert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Moroccan CERT Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/macert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/macert?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_macert_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MACert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"macert\"","tags":["indices"]}},"/v3/index/malicious-packages":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the malicious-packages index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Malicious Packages\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/malicious-packages?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/malicious-packages?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_malicious-packages_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MaliciousPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"malicious-packages\"","tags":["indices"]}},"/v3/index/malicious-vscode-exts":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the malicious-vscode-exts index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Malicious Visual Studio Code Extensions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/malicious-vscode-exts?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/malicious-vscode-exts?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_malicious-vscode-exts_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MaliciousVSCodeExts-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"malicious-vscode-exts\"","tags":["indices"]}},"/v3/index/manageengine":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the manageengine index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ManageEngine Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/manageengine?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/manageengine?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_manageengine_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ManageEngineAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"manageengine\"","tags":["indices"]}},"/v3/index/maven":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the maven index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Maven (Java) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/maven?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/maven?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_maven_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"maven\"","tags":["indices"]}},"/v3/index/mbed-tls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mbed-tls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mbed TLS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mbed-tls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mbed-tls?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_mbed-tls_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MbedTLS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"mbed-tls\"","tags":["indices"]}},"/v3/index/mcafee":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mcafee index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** McAfee Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mcafee?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mcafee?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_mcafee_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_McAfee-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"mcafee\"","tags":["indices"]}},"/v3/index/mediatek":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mediatek index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MediaTek Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mediatek?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mediatek?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_mediatek_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Mediatek-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"mediatek\"","tags":["indices"]}},"/v3/index/medtronic":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the medtronic index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Medtronic Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/medtronic?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/medtronic?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_medtronic_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MedtronicAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"medtronic\"","tags":["indices"]}},"/v3/index/mendix":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mendix index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mendix Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mendix?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mendix?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_mendix_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Mendix-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"mendix\"","tags":["indices"]}},"/v3/index/meta-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the meta-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Meta Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/meta-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/meta-advisories?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_meta-advisories_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MetaAdvisories-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"meta-advisories\"","tags":["indices"]}},"/v3/index/metasploit":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the metasploit index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Metasploit Modules\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/metasploit?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/metasploit?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_metasploit_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MetasploitExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"metasploit\"","tags":["indices"]}},"/v3/index/microsoft-csaf":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the microsoft-csaf index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Microsoft CSAF\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-csaf?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/microsoft-csaf?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_microsoft-csaf_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MicrosoftCSAF-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"microsoft-csaf\"","tags":["indices"]}},"/v3/index/microsoft-cvrf":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the microsoft-cvrf index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Microsoft Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-cvrf?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/microsoft-cvrf?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_microsoft-cvrf_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MicrosoftCVRF-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"microsoft-cvrf\"","tags":["indices"]}},"/v3/index/microsoft-driver-block-list":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the microsoft-driver-block-list index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Microsoft's Vulnerable Drivers Blocklist\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-driver-block-list?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/microsoft-driver-block-list?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_microsoft-driver-block-list_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MicrosoftDriverBlockList-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"microsoft-driver-block-list\"","tags":["indices"]}},"/v3/index/microsoft-kb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the microsoft-kb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Microsoft KB list by CVE\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-kb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/microsoft-kb?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_microsoft-kb_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MicrosoftKb-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"microsoft-kb\"","tags":["indices"]}},"/v3/index/mikrotik":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mikrotik index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MikroTik Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mikrotik?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mikrotik?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_mikrotik_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Mikrotik-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"mikrotik\"","tags":["indices"]}},"/v3/index/mindray":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mindray index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mindray Cybersecurity Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mindray?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mindray?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_mindray_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Mindray-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"mindray\"","tags":["indices"]}},"/v3/index/misp-threat-actors":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the misp-threat-actors index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MISP Threat Actors\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/misp-threat-actors?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/misp-threat-actors?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_misp-threat-actors_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MispValue-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"misp-threat-actors\"","tags":["indices"]}},"/v3/index/mitel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mitel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mitel Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mitel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mitel?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_mitel_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Mitel-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"mitel\"","tags":["indices"]}},"/v3/index/mitre-attack-cve":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mitre-attack-cve index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MITRE ATT\u0026CK Technique ID to CVE List\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-attack-cve?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mitre-attack-cve?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_mitre-attack-cve_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_MitreAttackToCVE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"mitre-attack-cve\"","tags":["indices"]}},"/v3/index/mitre-cvelist-v5":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mitre-cvelist-v5 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MITRE CVEList V5\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-cvelist-v5?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mitre-cvelist-v5?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_mitre-cvelist-v5_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MitreCVEListV5-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"mitre-cvelist-v5\"","tags":["indices"]}},"/v3/index/mitsubishi-electric":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mitsubishi-electric index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mitsubishi Electric Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mitsubishi-electric?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mitsubishi-electric?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_mitsubishi-electric_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MitsubishiElectricAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"mitsubishi-electric\"","tags":["indices"]}},"/v3/index/mongodb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mongodb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MongoDB Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mongodb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mongodb?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_mongodb_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MongoDB-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"mongodb\"","tags":["indices"]}},"/v3/index/moxa":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the moxa index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Moxa Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/moxa?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/moxa?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_moxa_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MoxaAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"moxa\"","tags":["indices"]}},"/v3/index/mozilla":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mozilla index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mozilla Foundation Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mozilla?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mozilla?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_mozilla_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MozillaAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"mozilla\"","tags":["indices"]}},"/v3/index/naver":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the naver index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Naver Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/naver?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/naver?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_naver_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Naver-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"naver\"","tags":["indices"]}},"/v3/index/ncsc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ncsc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NCSC Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ncsc?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ncsc_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NCSC-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ncsc\"","tags":["indices"]}},"/v3/index/ncsc-cves":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ncsc-cves index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NCSC CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc-cves?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ncsc-cves?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ncsc-cves_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NCSCCVE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ncsc-cves\"","tags":["indices"]}},"/v3/index/nec":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nec index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NEC Security Information Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nec?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nec?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nec_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NEC-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nec\"","tags":["indices"]}},"/v3/index/nessus":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nessus index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nessus Plugins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nessus?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nessus?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nessus_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Nessus-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nessus\"","tags":["indices"]}},"/v3/index/netapp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the netapp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NetApp Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/netapp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/netapp?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_netapp_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NetApp-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"netapp\"","tags":["indices"]}},"/v3/index/netatalk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the netatalk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Netatalk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/netatalk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/netatalk?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_netatalk_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Netatalk-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"netatalk\"","tags":["indices"]}},"/v3/index/netgate":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the netgate index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Netgate Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/netgate?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/netgate?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_netgate_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Netgate-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"netgate\"","tags":["indices"]}},"/v3/index/netgear":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the netgear index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NETGEAR Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/netgear?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/netgear?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_netgear_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Netgear-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"netgear\"","tags":["indices"]}},"/v3/index/netskope":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the netskope index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Netskope Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/netskope?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/netskope?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_netskope_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Netskope-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"netskope\"","tags":["indices"]}},"/v3/index/nexpose":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nexpose index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nexpose Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nexpose?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nexpose?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nexpose_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Nexpose-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nexpose\"","tags":["indices"]}},"/v3/index/nginx":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nginx index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nginx Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nginx?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nginx?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nginx_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NginxAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nginx\"","tags":["indices"]}},"/v3/index/nhs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nhs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NHS Cyber Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nhs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nhs?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nhs_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NHS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nhs\"","tags":["indices"]}},"/v3/index/ni":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ni index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** National Instruments Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ni?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ni?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ni_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NI-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ni\"","tags":["indices"]}},"/v3/index/nist-nvd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nist-nvd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NIST NVD 1.0 CVE data built from NIST NVD 2.0 CVE Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nist-nvd?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nist-nvd_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_CveItems-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nist-nvd\"","tags":["indices"]}},"/v3/index/nist-nvd2":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NIST NVD 2.0\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nist-nvd2?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nist-nvd2_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_NVD20CVE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nist-nvd2\"","tags":["indices"]}},"/v3/index/nist-nvd2-cpematch":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-cpematch index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NIST NVD 2.0 CPE Match\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-cpematch?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nist-nvd2-cpematch?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nist-nvd2-cpematch_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_NVD20CPEMatch-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nist-nvd2-cpematch\"","tags":["indices"]}},"/v3/index/nist-nvd2-sources":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-sources index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NIST NVD 2.0 Source Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-sources?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nist-nvd2-sources?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nist-nvd2-sources_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NVD20Source-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nist-nvd2-sources\"","tags":["indices"]}},"/v3/index/node-security":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the node-security index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Node.js Security Working Group Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/node-security?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/node-security?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_node-security_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NodeSecurity-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"node-security\"","tags":["indices"]}},"/v3/index/nodejs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nodejs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NodeJS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nodejs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nodejs?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nodejs_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NodeJS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nodejs\"","tags":["indices"]}},"/v3/index/nokia":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nokia index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nokia Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nokia?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nokia?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nokia_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Nokia-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nokia\"","tags":["indices"]}},"/v3/index/notepadplusplus":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the notepadplusplus index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Notepad++ Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/notepadplusplus?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/notepadplusplus?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_notepadplusplus_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NotePadPlusPlus-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"notepadplusplus\"","tags":["indices"]}},"/v3/index/nozomi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nozomi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nozomi Networks Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nozomi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nozomi?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nozomi_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Nozomi-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nozomi\"","tags":["indices"]}},"/v3/index/npm":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the npm index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NPM (JS/TS) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/npm?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/npm?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_npm_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"npm\"","tags":["indices"]}},"/v3/index/ntp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ntp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NTP Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ntp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ntp?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ntp_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NTP-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ntp\"","tags":["indices"]}},"/v3/index/nuclei":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nuclei index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nuclei Templates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nuclei?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nuclei?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nuclei_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Nuclei-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nuclei\"","tags":["indices"]}},"/v3/index/nuget":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nuget index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nuget (C#/F#) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nuget?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nuget?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nuget_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nuget\"","tags":["indices"]}},"/v3/index/nvd-cpe-dictionary":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nvd-cpe-dictionary index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NVD's CPE Dictionary\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nvd-cpe-dictionary?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nvd-cpe-dictionary?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nvd-cpe-dictionary_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NVDCPEDictionary-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nvd-cpe-dictionary\"","tags":["indices"]}},"/v3/index/nvidia":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nvidia index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NVIDIA Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nvidia?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nvidia?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nvidia_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SecurityBulletin-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nvidia\"","tags":["indices"]}},"/v3/index/nz-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nz-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CERT NZ Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nz-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nz-advisories?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nz-advisories_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NZAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nz-advisories\"","tags":["indices"]}},"/v3/index/octopus-deploy":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the octopus-deploy index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Octopus Deploy Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/octopus-deploy?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/octopus-deploy?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_octopus-deploy_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OctopusDeploy-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"octopus-deploy\"","tags":["indices"]}},"/v3/index/okta":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the okta index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Okta Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/okta?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/okta?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_okta_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Okta-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"okta\"","tags":["indices"]}},"/v3/index/omron":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the omron index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Omron Vulnerability Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/omron?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/omron?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_omron_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Omron-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"omron\"","tags":["indices"]}},"/v3/index/omron-eol":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the omron-eol index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Omron End of Life Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/omron-eol?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/omron-eol?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_omron-eol_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GenericEOL-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"omron-eol\"","tags":["indices"]}},"/v3/index/one-e":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the one-e index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 1E Published Product Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/one-e?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/one-e?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_one-e_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OneE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"one-e\"","tags":["indices"]}},"/v3/index/opam":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the opam index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** opam (OCaml) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/opam?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/opam?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_opam_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"opam\"","tags":["indices"]}},"/v3/index/open-cvdb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the open-cvdb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** The Open Cloud Vulnerability \u0026 Security Issue Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/open-cvdb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/open-cvdb?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_open-cvdb_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OpenCVDB-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"open-cvdb\"","tags":["indices"]}},"/v3/index/openbsd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openbsd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenBSD Security Fixes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openbsd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openbsd?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_openbsd_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OpenBSD-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"openbsd\"","tags":["indices"]}},"/v3/index/opengear":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the opengear index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Opengear Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/opengear?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/opengear?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_opengear_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Opengear-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"opengear\"","tags":["indices"]}},"/v3/index/openjdk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openjdk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenJDK Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openjdk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openjdk?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_openjdk_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OpenJDK-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"openjdk\"","tags":["indices"]}},"/v3/index/openssh":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openssh index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenSSH Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openssh?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openssh?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_openssh_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OpenSSH-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"openssh\"","tags":["indices"]}},"/v3/index/openssl-secadv":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openssl-secadv index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenSSL Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openssl-secadv?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openssl-secadv?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_openssl-secadv_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OpenSSLSecAdv-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"openssl-secadv\"","tags":["indices"]}},"/v3/index/openstack":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openstack index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenStack Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openstack?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openstack?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_openstack_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OpenStack-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"openstack\"","tags":["indices"]}},"/v3/index/openwrt":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openwrt index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenWrt Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openwrt?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openwrt?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_openwrt_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_WRT-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"openwrt\"","tags":["indices"]}},"/v3/index/oracle":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the oracle index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Oracle Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/oracle?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/oracle?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_oracle_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MetaData-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"oracle\"","tags":["indices"]}},"/v3/index/oracle-cpu":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Oracle Critical Patch Update Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/oracle-cpu?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_oracle-cpu_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OracleCPU-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"oracle-cpu\"","tags":["indices"]}},"/v3/index/oracle-cpu-csaf":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu-csaf index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Oracle Critical Patch Updates CSAF\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu-csaf?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/oracle-cpu-csaf?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_oracle-cpu-csaf_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OracleCPUCSAF-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"oracle-cpu-csaf\"","tags":["indices"]}},"/v3/index/osv":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the osv index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Open Source Vulnerabilities Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/osv?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/osv?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_osv_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OSV-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"osv\"","tags":["indices"]}},"/v3/index/otrs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the otrs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OTRS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/otrs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/otrs?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_otrs_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OTRS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"otrs\"","tags":["indices"]}},"/v3/index/owncloud":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the owncloud index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OwnCloud Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/owncloud?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/owncloud?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_owncloud_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OwnCloud-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"owncloud\"","tags":["indices"]}},"/v3/index/packetstorm":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the packetstorm index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PacketStorm\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/packetstorm?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/packetstorm?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_packetstorm_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PacketstormExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"packetstorm\"","tags":["indices"]}},"/v3/index/palantir":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the palantir index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Palantir Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/palantir?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/palantir?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_palantir_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Palantir-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"palantir\"","tags":["indices"]}},"/v3/index/palo-alto":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the palo-alto index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Palo Alto Networks Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/palo-alto?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/palo-alto?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_palo-alto_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PaloAltoAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"palo-alto\"","tags":["indices"]}},"/v3/index/panasonic":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the panasonic index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Panasonic Vulnerability Advisory List\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/panasonic?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/panasonic?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_panasonic_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Panasonic-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"panasonic\"","tags":["indices"]}},"/v3/index/papercut":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the papercut index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PaperCut Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/papercut?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/papercut?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_papercut_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PaperCut-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"papercut\"","tags":["indices"]}},"/v3/index/pega":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pega index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Pega Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pega?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pega?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_pega_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Pega-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"pega\"","tags":["indices"]}},"/v3/index/philips":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the philips index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Philips Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/philips?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/philips?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_philips_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PhilipsAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"philips\"","tags":["indices"]}},"/v3/index/phoenix-contact":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the phoenix-contact index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Phoenix Contact Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/phoenix-contact?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/phoenix-contact?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_phoenix-contact_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PhoenixContactAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"phoenix-contact\"","tags":["indices"]}},"/v3/index/php-my-admin":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the php-my-admin index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** phpMyAdmin Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/php-my-admin?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/php-my-admin?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_php-my-admin_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PHPMyAdmin-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"php-my-admin\"","tags":["indices"]}},"/v3/index/pkcert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pkcert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PK CERT Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pkcert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pkcert?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_pkcert_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PKCert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"pkcert\"","tags":["indices"]}},"/v3/index/postgressql":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the postgressql index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PostgresSQL Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/postgressql?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/postgressql?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_postgressql_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PostgresSQL-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"postgressql\"","tags":["indices"]}},"/v3/index/powerdns":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the powerdns index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PowerDNS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/powerdns?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/powerdns?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_powerdns_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PowerDNS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"powerdns\"","tags":["indices"]}},"/v3/index/progress":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the progress index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Progress Product Alert Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/progress?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/progress?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_progress_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Progress-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"progress\"","tags":["indices"]}},"/v3/index/proofpoint":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the proofpoint index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Proofpoint Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/proofpoint?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/proofpoint?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_proofpoint_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Proofpoint-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"proofpoint\"","tags":["indices"]}},"/v3/index/ptc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ptc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PTC Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ptc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ptc?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ptc_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PTC-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ptc\"","tags":["indices"]}},"/v3/index/pub":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pub index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Pub (Dart/Flutter) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pub?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pub?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_pub_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"pub\"","tags":["indices"]}},"/v3/index/pure-storage":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pure-storage index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Pure Storage Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pure-storage?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pure-storage?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_pure-storage_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PureStorage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"pure-storage\"","tags":["indices"]}},"/v3/index/pypa-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pypa-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PyPA Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pypa-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pypa-advisories?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_pypa-advisories_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PyPAAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"pypa-advisories\"","tags":["indices"]}},"/v3/index/pypi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pypi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PyPi (Python) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pypi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pypi?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_pypi_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"pypi\"","tags":["indices"]}},"/v3/index/qnap":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qnap index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** QNAP Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qnap?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qnap?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_qnap_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_QNAPAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"qnap\"","tags":["indices"]}},"/v3/index/qqids":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qqids index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Qualys QIDs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qqids?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qqids?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_qqids_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_QQID-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"qqids\"","tags":["indices"]}},"/v3/index/qualcomm":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qualcomm index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Qualcomm Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qualcomm?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qualcomm?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_qualcomm_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Qualcomm-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"qualcomm\"","tags":["indices"]}},"/v3/index/qualys":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qualys index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Qualys Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qualys?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qualys?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_qualys_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Qualys-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"qualys\"","tags":["indices"]}},"/v3/index/qualys-qids":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qualys-qids index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Qualys QID\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qualys-qids?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qualys-qids?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_qualys-qids_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_QualysQID-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"qualys-qids\"","tags":["indices"]}},"/v3/index/qubes-qsb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qubes-qsb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Qubes Security Bulletin\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qubes-qsb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qubes-qsb?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_qubes-qsb_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_QSB-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"qubes-qsb\"","tags":["indices"]}},"/v3/index/ransomware":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ransomware index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Ransomware\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ransomware?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ransomware?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ransomware_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_RansomwareExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ransomware\"","tags":["indices"]}},"/v3/index/red-lion":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the red-lion index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Red-Lion Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/red-lion?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/red-lion?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_red-lion_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_RedLion-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"red-lion\"","tags":["indices"]}},"/v3/index/redhat":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the redhat index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Red Hat Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/redhat?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/redhat?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_redhat_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_RedhatCVE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"redhat\"","tags":["indices"]}},"/v3/index/redhat-cves":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the redhat-cves index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CSAF data for redhat\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/redhat-cves?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/redhat-cves?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_redhat-cves_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_RhelCVE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"redhat-cves\"","tags":["indices"]}},"/v3/index/renesas":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the renesas index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Renesas Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/renesas?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/renesas?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_renesas_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Renesas-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"renesas\"","tags":["indices"]}},"/v3/index/revive":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the revive index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Revive Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/revive?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/revive?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_revive_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Revive-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"revive\"","tags":["indices"]}},"/v3/index/roche":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the roche index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Roche Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/roche?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/roche?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_roche_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Roche-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"roche\"","tags":["indices"]}},"/v3/index/rockwell":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rockwell index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Rockwell Automation Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rockwell?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rockwell?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_rockwell_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Rockwell-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"rockwell\"","tags":["indices"]}},"/v3/index/rocky":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rocky index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Rocky Linux Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rocky?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rocky?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_rocky_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_Update-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"rocky\"","tags":["indices"]}},"/v3/index/rocky-errata":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rocky-errata index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Rocky Errata\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-errata?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rocky-errata?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_rocky-errata_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_RockyErrata-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"rocky-errata\"","tags":["indices"]}},"/v3/index/rocky-purls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rocky-purls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Rocky Purls\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-purls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rocky-purls?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_rocky-purls_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"rocky-purls\"","tags":["indices"]}},"/v3/index/rsync":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rsync index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Rsync Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rsync?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rsync?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_rsync_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Rsync-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"rsync\"","tags":["indices"]}},"/v3/index/ruckus":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ruckus index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ruckus Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ruckus?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ruckus?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ruckus_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Ruckus-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ruckus\"","tags":["indices"]}},"/v3/index/rustsec-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rustsec-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** RustSec Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rustsec-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rustsec-advisories?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_rustsec-advisories_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_RustsecAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"rustsec-advisories\"","tags":["indices"]}},"/v3/index/sacert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sacert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Saudi CERT\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sacert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sacert?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sacert_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SAAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sacert\"","tags":["indices"]}},"/v3/index/safran":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the safran index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Safran Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/safran?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/safran?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_safran_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Safran-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"safran\"","tags":["indices"]}},"/v3/index/saint":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the saint index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SAINT Exploits\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/saint?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/saint?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_saint_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SaintExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"saint\"","tags":["indices"]}},"/v3/index/salesforce":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the salesforce index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SalesForce Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/salesforce?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/salesforce?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_salesforce_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SalesForce-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"salesforce\"","tags":["indices"]}},"/v3/index/samba":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the samba index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Samba Security Releases\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/samba?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/samba?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_samba_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Samba-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"samba\"","tags":["indices"]}},"/v3/index/sandisk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sandisk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sandisk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sandisk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sandisk?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sandisk_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Sandisk-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sandisk\"","tags":["indices"]}},"/v3/index/sans-dshield":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sans-dshield index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SANS DShield Honeypot Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sans-dshield?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sans-dshield?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sans-dshield_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SansDshield-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sans-dshield\"","tags":["indices"]}},"/v3/index/sap":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sap index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SAP Security Patch Days\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sap?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sap?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sap_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SAP-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sap\"","tags":["indices"]}},"/v3/index/schneider-electric":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the schneider-electric index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Schneider Electric Security Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/schneider-electric?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/schneider-electric?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_schneider-electric_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SchneiderElectricAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"schneider-electric\"","tags":["indices"]}},"/v3/index/schutzwerk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the schutzwerk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Schutzwerk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/schutzwerk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/schutzwerk?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_schutzwerk_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Schutzwerk-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"schutzwerk\"","tags":["indices"]}},"/v3/index/sec-consult":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sec-consult index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SEC Consult Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sec-consult?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sec-consult?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sec-consult_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SECConsult-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sec-consult\"","tags":["indices"]}},"/v3/index/securitylab":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the securitylab index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Security Lab Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/securitylab?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/securitylab?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_securitylab_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SecurityLab-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"securitylab\"","tags":["indices"]}},"/v3/index/seebug":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the seebug index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Seebug Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/seebug?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/seebug?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_seebug_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SeebugExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"seebug\"","tags":["indices"]}},"/v3/index/sel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Schweitzer Engineering Laboratories Security Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sel?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sel_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Sel-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sel\"","tags":["indices"]}},"/v3/index/sentinelone":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sentinelone index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SentinelOne Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sentinelone?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sentinelone?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sentinelone_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SentinelOne-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sentinelone\"","tags":["indices"]}},"/v3/index/servicenow":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the servicenow index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ServiceNow CVE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/servicenow?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/servicenow?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_servicenow_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ServiceNow-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"servicenow\"","tags":["indices"]}},"/v3/index/shadowserver-exploited":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the shadowserver-exploited index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Shadowserver Foundation Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/shadowserver-exploited?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/shadowserver-exploited?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_shadowserver-exploited_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ShadowServerExploitedVulnerability-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"shadowserver-exploited\"","tags":["indices"]}},"/v3/index/shielder":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the shielder index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Shielder Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/shielder?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/shielder?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_shielder_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Shielder-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"shielder\"","tags":["indices"]}},"/v3/index/sick":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sick index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SICK Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sick?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sick?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sick_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Sick-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sick\"","tags":["indices"]}},"/v3/index/siemens":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the siemens index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Siemens Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/siemens?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/siemens?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_siemens_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SiemensAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"siemens\"","tags":["indices"]}},"/v3/index/sierra-wireless":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sierra-wireless index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sierra Wireless Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sierra-wireless?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sierra-wireless?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sierra-wireless_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SierraWireless-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sierra-wireless\"","tags":["indices"]}},"/v3/index/sigmahq-sigma-rules":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sigmahq-sigma-rules index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sigma Rules\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sigmahq-sigma-rules?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sigmahq-sigma-rules?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sigmahq-sigma-rules_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SigmaRule-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sigmahq-sigma-rules\"","tags":["indices"]}},"/v3/index/singcert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the singcert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CSA Alerts and Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/singcert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/singcert?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_singcert_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SingCert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"singcert\"","tags":["indices"]}},"/v3/index/sitecore":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sitecore index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sitecore Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sitecore?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sitecore?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sitecore_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Sitecore-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sitecore\"","tags":["indices"]}},"/v3/index/slackware":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the slackware index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Slackware Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/slackware?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/slackware?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_slackware_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Slackware-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"slackware\"","tags":["indices"]}},"/v3/index/solarwinds":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the solarwinds index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SolarWinds Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/solarwinds?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/solarwinds?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_solarwinds_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SolarWindsAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"solarwinds\"","tags":["indices"]}},"/v3/index/solr":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the solr index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Solr CVE Reports\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/solr?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/solr?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_solr_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Solr-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"solr\"","tags":["indices"]}},"/v3/index/sonatype":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sonatype index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sonatype Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sonatype?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sonatype?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sonatype_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Sonatype-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sonatype\"","tags":["indices"]}},"/v3/index/sonicwall":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sonicwall index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SonicWall Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sonicwall?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sonicwall?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sonicwall_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SonicWallAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sonicwall\"","tags":["indices"]}},"/v3/index/spacelabs-healthcare":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the spacelabs-healthcare index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Spacelabs Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/spacelabs-healthcare?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/spacelabs-healthcare?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_spacelabs-healthcare_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SpacelabsHealthcareAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"spacelabs-healthcare\"","tags":["indices"]}},"/v3/index/splunk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the splunk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Splunk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/splunk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/splunk?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_splunk_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Splunk-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"splunk\"","tags":["indices"]}},"/v3/index/spring":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the spring index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Spring Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/spring?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/spring?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_spring_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Spring-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"spring\"","tags":["indices"]}},"/v3/index/ssd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ssd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SSD Secure Disclosure Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ssd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ssd?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ssd_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SSDAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ssd\"","tags":["indices"]}},"/v3/index/stormshield":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the stormshield index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Stormshield Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/stormshield?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/stormshield?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_stormshield_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Stormshield-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"stormshield\"","tags":["indices"]}},"/v3/index/stryker":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the stryker index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Stryker Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/stryker?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/stryker?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_stryker_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_StrykerAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"stryker\"","tags":["indices"]}},"/v3/index/sudo":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sudo index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sudo Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sudo?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sudo?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sudo_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Sudo-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sudo\"","tags":["indices"]}},"/v3/index/suse":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the suse index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SUSE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/suse?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/suse?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_suse_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Cvrf-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"suse\"","tags":["indices"]}},"/v3/index/suse-security":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the suse-security index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Suse Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/suse-security?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/suse-security?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_suse-security_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SuseSecurity-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"suse-security\"","tags":["indices"]}},"/v3/index/swift":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the swift index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Swift packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/swift?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/swift?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_swift_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"swift\"","tags":["indices"]}},"/v3/index/swisslog-healthcare":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the swisslog-healthcare index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Swisslog Healthcare CVE Disclosures\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/swisslog-healthcare?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/swisslog-healthcare?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_swisslog-healthcare_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SwisslogHealthcareAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"swisslog-healthcare\"","tags":["indices"]}},"/v3/index/symfony":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the symfony index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Symfony Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/symfony?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/symfony?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_symfony_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Symfony-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"symfony\"","tags":["indices"]}},"/v3/index/synacktiv":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the synacktiv index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Synacktiv Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/synacktiv?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/synacktiv?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_synacktiv_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Synacktiv-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"synacktiv\"","tags":["indices"]}},"/v3/index/syncrosoft":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the syncrosoft index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SyncroSoft Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/syncrosoft?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/syncrosoft?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_syncrosoft_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SyncroSoft-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"syncrosoft\"","tags":["indices"]}},"/v3/index/synology":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the synology index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Synology Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/synology?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/synology?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_synology_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Synology-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"synology\"","tags":["indices"]}},"/v3/index/syss":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the syss index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Syss Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/syss?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/syss?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_syss_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Syss-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"syss\"","tags":["indices"]}},"/v3/index/tailscale":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the tailscale index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Tailscale Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/tailscale?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/tailscale?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_tailscale_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Tailscale-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"tailscale\"","tags":["indices"]}},"/v3/index/teamviewer":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the teamviewer index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** TeamViewer Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/teamviewer?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/teamviewer?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_teamviewer_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TeamViewer-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"teamviewer\"","tags":["indices"]}},"/v3/index/tenable-research-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the tenable-research-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Tenable Research Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/tenable-research-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/tenable-research-advisories?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_tenable-research-advisories_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TenableResearchAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"tenable-research-advisories\"","tags":["indices"]}},"/v3/index/tencent":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the tencent index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Tencent Vulnerability Risk Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/tencent?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/tencent?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_tencent_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Tencent-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"tencent\"","tags":["indices"]}},"/v3/index/thales":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the thales index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Thales Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/thales?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/thales?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_thales_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Thales-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"thales\"","tags":["indices"]}},"/v3/index/themissinglink":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the themissinglink index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** the missing link Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/themissinglink?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/themissinglink?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_themissinglink_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TheMissingLink-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"themissinglink\"","tags":["indices"]}},"/v3/index/thermo-fisher":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the thermo-fisher index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Thermo Fisher Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/thermo-fisher?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/thermo-fisher?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_thermo-fisher_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ThermoFisher-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"thermo-fisher\"","tags":["indices"]}},"/v3/index/threat-actors":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the threat-actors index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Threat Actors Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/threat-actors?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/threat-actors?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_threat-actors_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ThreatActorWithExternalObjects-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"threat-actors\"","tags":["indices"]}},"/v3/index/ti":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ti index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Texas Instruments Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ti?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ti?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ti_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TI-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ti\"","tags":["indices"]}},"/v3/index/tibco":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the tibco index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** TIBCO Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/tibco?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/tibco?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_tibco_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Tibco-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"tibco\"","tags":["indices"]}},"/v3/index/tp-link":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the tp-link index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** TP-Link Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/tp-link?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/tp-link?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_tp-link_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TPLink-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"tp-link\"","tags":["indices"]}},"/v3/index/trane-technology":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the trane-technology index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Trane Technology Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/trane-technology?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/trane-technology?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_trane-technology_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TraneTechnology-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"trane-technology\"","tags":["indices"]}},"/v3/index/trendmicro":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the trendmicro index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Trend Micro Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/trendmicro?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/trendmicro?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_trendmicro_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TrendMicro-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"trendmicro\"","tags":["indices"]}},"/v3/index/trustwave":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the trustwave index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Trustwave Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/trustwave?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/trustwave?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_trustwave_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Trustwave-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"trustwave\"","tags":["indices"]}},"/v3/index/twcert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the twcert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Taiwan CERT Vulnerability Notes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/twcert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/twcert?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_twcert_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TWCertAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"twcert\"","tags":["indices"]}},"/v3/index/ubiquiti":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ubiquiti index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ubiquiti Security Advisory Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ubiquiti?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ubiquiti?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ubiquiti_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Ubiquiti-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ubiquiti\"","tags":["indices"]}},"/v3/index/ubuntu":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ubuntu index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ubuntu Security Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ubuntu?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ubuntu_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_UbuntuCVE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ubuntu\"","tags":["indices"]}},"/v3/index/ubuntu-purls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ubuntu-purls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ubuntu Purls\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu-purls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ubuntu-purls?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ubuntu-purls_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ubuntu-purls\"","tags":["indices"]}},"/v3/index/unify":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the unify index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Unify Product Security Advisories and Security Notes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/unify?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/unify?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_unify_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Unify-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"unify\"","tags":["indices"]}},"/v3/index/unisoc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the unisoc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** UNISOC Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/unisoc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/unisoc?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_unisoc_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Unisoc-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"unisoc\"","tags":["indices"]}},"/v3/index/usd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the usd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** usd Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/usd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/usd?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_usd_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_USD-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"usd\"","tags":["indices"]}},"/v3/index/usom":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the usom index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** USOM Security Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/usom?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/usom?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_usom_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_USOMAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"usom\"","tags":["indices"]}},"/v3/index/vandyke":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vandyke index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VanDyke Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vandyke?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vandyke?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vandyke_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VanDyke-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vandyke\"","tags":["indices"]}},"/v3/index/vapidlabs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vapidlabs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VapidLabs Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vapidlabs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vapidlabs?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vapidlabs_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VapidLabsAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vapidlabs\"","tags":["indices"]}},"/v3/index/vc-cpe-dictionary":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vc-cpe-dictionary index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck CPE Dictionary\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vc-cpe-dictionary?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vc-cpe-dictionary?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vc-cpe-dictionary_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VCCPEDictionary-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vc-cpe-dictionary\"","tags":["indices"]}},"/v3/index/vde":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vde index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VDE CERT Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vde?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vde?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vde_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VDEAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vde\"","tags":["indices"]}},"/v3/index/veeam":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the veeam index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Veeam Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/veeam?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/veeam?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_veeam_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Veeam-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"veeam\"","tags":["indices"]}},"/v3/index/veritas":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the veritas index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Veritas Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/veritas?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/veritas?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_veritas_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Veritas-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"veritas\"","tags":["indices"]}},"/v3/index/virtuozzo":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the virtuozzo index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Virtuozzo Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/virtuozzo?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/virtuozzo?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_virtuozzo_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Virtuozzo-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"virtuozzo\"","tags":["indices"]}},"/v3/index/vlc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vlc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VLC Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vlc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vlc?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vlc_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VLC-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vlc\"","tags":["indices"]}},"/v3/index/vmware":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vmware index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VMWare Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vmware?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vmware?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vmware_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VMWareAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vmware\"","tags":["indices"]}},"/v3/index/voidsec":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the voidsec index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VoidSec Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/voidsec?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/voidsec?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_voidsec_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VoidSec-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"voidsec\"","tags":["indices"]}},"/v3/index/vulncheck":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulncheck_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VulnCheck-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulncheck\"","tags":["indices"]}},"/v3/index/vulncheck-canaries":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Canary Intel\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-canaries?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulncheck-canaries_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"src_country","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"dst_country","schema":{"type":"string"}},{"description":"Source IP address","in":"query","name":"src_ip","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulncheck-canaries\"","tags":["indices"]}},"/v3/index/vulncheck-canaries-10d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-10d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Canary Intel (10 day)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-10d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-canaries-10d?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulncheck-canaries-10d_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"src_country","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"dst_country","schema":{"type":"string"}},{"description":"Source IP address","in":"query","name":"src_ip","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulncheck-canaries-10d\"","tags":["indices"]}},"/v3/index/vulncheck-canaries-30d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-30d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Canary Intel (30 day)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-30d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-canaries-30d?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulncheck-canaries-30d_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"src_country","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"dst_country","schema":{"type":"string"}},{"description":"Source IP address","in":"query","name":"src_ip","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulncheck-canaries-30d\"","tags":["indices"]}},"/v3/index/vulncheck-canaries-3d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-3d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Canary Intel (3 day)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-3d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-canaries-3d?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulncheck-canaries-3d_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"src_country","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"dst_country","schema":{"type":"string"}},{"description":"Source IP address","in":"query","name":"src_ip","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulncheck-canaries-3d\"","tags":["indices"]}},"/v3/index/vulncheck-canaries-90d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-90d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Canary Intel (90 day)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-90d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-canaries-90d?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulncheck-canaries-90d_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"src_country","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"dst_country","schema":{"type":"string"}},{"description":"Source IP address","in":"query","name":"src_ip","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulncheck-canaries-90d\"","tags":["indices"]}},"/v3/index/vulncheck-config":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-config index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Configurations\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-config?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-config?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulncheck-config_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VulnCheckConfig-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulncheck-config\"","tags":["indices"]}},"/v3/index/vulncheck-cvelist-v5":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-cvelist-v5 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck CVEList V5\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-cvelist-v5?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-cvelist-v5?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulncheck-cvelist-v5_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VulnCheckCVEListV5-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulncheck-cvelist-v5\"","tags":["indices"]}},"/v3/index/vulncheck-kev":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-kev index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck KEV\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-kev?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-kev?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulncheck-kev_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VulnCheckKEV-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulncheck-kev\"","tags":["indices"]}},"/v3/index/vulncheck-nvd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-nvd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck NVD\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-nvd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-nvd?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulncheck-nvd_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_CveItemsExtended-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulncheck-nvd\"","tags":["indices"]}},"/v3/index/vulncheck-nvd2":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-nvd2 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck NVD V2\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-nvd2?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-nvd2?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulncheck-nvd2_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_NVD20CVEExtended-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulncheck-nvd2\"","tags":["indices"]}},"/v3/index/vulnerability-aliases":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulnerability-aliases index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Vulnerability Aliases\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulnerability-aliases?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulnerability-aliases?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulnerability-aliases_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_VulnerabilityAlias-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulnerability-aliases\"","tags":["indices"]}},"/v3/index/vulnrichment":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulnrichment index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CISA Vulnrichment\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulnrichment?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulnrichment?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulnrichment_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Vulnrichment-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulnrichment\"","tags":["indices"]}},"/v3/index/vyaire":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vyaire index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Vyaire Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vyaire?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vyaire?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vyaire_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VYAIREAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vyaire\"","tags":["indices"]}},"/v3/index/watchguard":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the watchguard index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Watchguard Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/watchguard?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/watchguard?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_watchguard_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_WatchGuard-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"watchguard\"","tags":["indices"]}},"/v3/index/whatsapp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the whatsapp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** WhatsApp Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/whatsapp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/whatsapp?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_whatsapp_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_WhatsApp-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"whatsapp\"","tags":["indices"]}},"/v3/index/wibu":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the wibu index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Wibu Systems Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/wibu?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/wibu?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_wibu_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Wibu-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"wibu\"","tags":["indices"]}},"/v3/index/wireshark":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the wireshark index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Wireshark Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/wireshark?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/wireshark?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_wireshark_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Wireshark-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"wireshark\"","tags":["indices"]}},"/v3/index/with-secure":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the with-secure index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** With Secure Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/with-secure?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/with-secure?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_with-secure_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_WithSecure-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"with-secure\"","tags":["indices"]}},"/v3/index/wolfi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the wolfi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Wolfi Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/wolfi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/wolfi?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_wolfi_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Wolfi-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"wolfi\"","tags":["indices"]}},"/v3/index/wolfssl":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the wolfssl index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** WolfSSL Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/wolfssl?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/wolfssl?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_wolfssl_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_WolfSSL-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"wolfssl\"","tags":["indices"]}},"/v3/index/wordfence":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the wordfence index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Wordfence Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/wordfence?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/wordfence?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_wordfence_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Wordfence-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"wordfence\"","tags":["indices"]}},"/v3/index/xen":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the xen index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Xen Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/xen?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/xen?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_xen_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Xen-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"xen\"","tags":["indices"]}},"/v3/index/xerox":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the xerox index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Xerox Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/xerox?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/xerox?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_xerox_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Xerox-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"xerox\"","tags":["indices"]}},"/v3/index/xiaomi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the xiaomi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Xiaomi Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/xiaomi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/xiaomi?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_xiaomi_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Xiaomi-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"xiaomi\"","tags":["indices"]}},"/v3/index/xylem":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the xylem index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Xylem Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/xylem?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/xylem?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_xylem_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Xylem-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"xylem\"","tags":["indices"]}},"/v3/index/yamaha":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the yamaha index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Yamaha Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/yamaha?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/yamaha?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_yamaha_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Yamaha-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"yamaha\"","tags":["indices"]}},"/v3/index/yokogawa":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the yokogawa index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Yokogawa Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/yokogawa?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/yokogawa?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_yokogawa_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_YokogawaAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"yokogawa\"","tags":["indices"]}},"/v3/index/yubico":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the yubico index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Yubico Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/yubico?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/yubico?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_yubico_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Yubico-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"yubico\"","tags":["indices"]}},"/v3/index/zdi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zdi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zero Day Initiative Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zdi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zdi?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_zdi_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ZeroDayAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"zdi\"","tags":["indices"]}},"/v3/index/zebra":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zebra index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zebra Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zebra?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zebra?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_zebra_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Zebra-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"zebra\"","tags":["indices"]}},"/v3/index/zebra-eol":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zebra-eol index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zebra End of Life Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zebra-eol?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zebra-eol?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_zebra-eol_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GenericEOL-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"zebra-eol\"","tags":["indices"]}},"/v3/index/zeroscience":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zeroscience index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ZeroScience Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zeroscience?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zeroscience?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_zeroscience_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ZeroScienceAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"zeroscience\"","tags":["indices"]}},"/v3/index/zimbra":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zimbra index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zimbra Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zimbra?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zimbra?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_zimbra_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Zimbra-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"zimbra\"","tags":["indices"]}},"/v3/index/zoom":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zoom index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zoom Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zoom?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zoom?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_zoom_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Zoom-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"zoom\"","tags":["indices"]}},"/v3/index/zscaler":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zscaler index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zscaler Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zscaler?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zscaler?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_zscaler_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Zscaler-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"zscaler\"","tags":["indices"]}},"/v3/index/zuso":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zuso index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ZUSO Vulnerability Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zuso?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zuso?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_zuso_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Zuso-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"zuso\"","tags":["indices"]}},"/v3/index/zyxel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zyxel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zyxel Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zyxel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zyxel?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_zyxel_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Zyxel-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"zyxel\"","tags":["indices"]}},"/v3/openapi":{"get":{"description":"Return the VulnCheck API (v3) OpenAPI specification","operationId":"openapi_get","responses":{"200":{"content":{"application/json":{"schema":{"additionalProperties":{},"type":"object"}}},"description":"OK"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return OpenAPI specification","tags":["endpoints"]}},"/v3/pdns/vulncheck-c2":{"get":{"description":"Retrieve a list of hostnames, identified as running Command \u0026 Control infrastructure.","operationId":"pdns_vulncheck-c2_get","parameters":[{"description":"Format of the Hostnames in the response (Defaults To: text)","in":"query","name":"format","schema":{"enum":["txt","json","text"],"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Retrieve a list of C2 Hostnames","tags":["endpoints"]}},"/v3/purl":{"get":{"description":"Based on the specified PURL, this endpoint will return a list of vulnerabilities that are related to the package. We currently support hex, golang, hackage, npm, and pypi","operationId":"purl_get","parameters":[{"description":"URL string used to identify and locate a software package","in":"query","name":"purl","required":true,"schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-v3controllers_PurlResponseData-v3controllers_PurlResponseMetadata"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Request vulnerabilities related to a PURL","tags":["endpoints"]}},"/v3/purls":{"post":{"description":"Accepts a JSON array of PURLs in the request body and returns a list of vulnerabilities","operationId":"purls_post","requestBody":{"content":{"application/json":{"schema":{"items":{"type":"string"},"title":"purls","type":"array"}}},"description":"PURL strings used to identify and locate software packages","required":true},"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-v3controllers_PurlsResponseData-v3controllers_PurlsResponseMetadata"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Request vulnerabilities related to a list of PURLs","tags":["endpoints"]}},"/v3/rules/initial-access/{type}":{"get":{"description":"Retrieve set of initial-access detection rules by type","operationId":"rules_initial-access_type_get","parameters":[{"description":"Type of ruleset to retrieve","in":"path","name":"type","required":true,"schema":{"enum":["snort","suricata"],"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Retrieve set of initial-access detection rules","tags":["endpoints"]}},"/v3/tags/vulncheck-c2":{"get":{"description":"Retrieve a list of IP addresses, identified as running Command \u0026 Control infrastructure","operationId":"tags_vulncheck-c2_get","parameters":[{"description":"Format of the IP Addresses in the response (Defaults To: text)","in":"query","name":"format","schema":{"enum":["txt","json","text"],"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Retrieve a list of C2 IP addresses","tags":["endpoints"]}},"/v4/advisory":{"get":{"description":"Query the VulnCheck v4 advisory index","operationId":"v4QueryAdvisories","parameters":[{"description":"Filter by advisory feed name (e.g. 'vulncheck')","in":"query","name":"name","schema":{"type":"string"}},{"description":"Filter by CVE ID (e.g. 'CVE-2024-1234')","in":"query","name":"cve_id","schema":{"type":"string"}},{"description":"Filter by vendor name","in":"query","name":"vendor","schema":{"type":"string"}},{"description":"Filter by product name","in":"query","name":"product","schema":{"type":"string"}},{"description":"Filter by OS/platform","in":"query","name":"platform","schema":{"type":"string"}},{"description":"Filter by product version (semver-aware)","in":"query","name":"version","schema":{"type":"string"}},{"description":"Filter by CPE (e.g. 'cpe:2.3:a:vendor:product:*')","in":"query","name":"cpe","schema":{"type":"string"}},{"description":"Filter by package name","in":"query","name":"package_name","schema":{"type":"string"}},{"description":"Filter by package URL (PURL)","in":"query","name":"purl","schema":{"type":"string"}},{"description":"Filter by reference URL","in":"query","name":"reference_url","schema":{"type":"string"}},{"description":"Filter by reference tag (e.g. 'patch', 'advisory')","in":"query","name":"reference_tag","schema":{"type":"string"}},{"description":"Filter by description language (e.g. 'en')","in":"query","name":"description_lang","schema":{"type":"string"}},{"description":"Return advisories updated after this date (RFC3339 or date-math e.g. 'now-30d')","in":"query","name":"updatedAfter","schema":{"type":"string"}},{"description":"Return advisories updated before this date (RFC3339 or date-math)","in":"query","name":"updatedBefore","schema":{"type":"string"}},{"description":"Page number (default: 1)","in":"query","name":"page","schema":{"type":"integer"}},{"description":"Results per page, max 100 (default: 10)","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"Presence activates cursor mode from the first page (value is ignored; cannot be combined with page)","in":"query","name":"start_cursor","schema":{"type":"string"}},{"description":"Cursor from previous response _meta.next_cursor to fetch the next page","in":"query","name":"cursor","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/search.V4AdvisoryReturnValue"}}},"description":"OK"},"400":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/search.ErrorResponse"}}},"description":"Bad Request"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/search.ErrorResponse"}}},"description":"Unauthorized"},"402":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/search.ErrorResponse"}}},"description":"Payment Required"},"503":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/search.ErrorResponse"}}},"description":"Service Unavailable"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Query advisories","tags":["advisory"]}},"/v4/advisory/list":{"get":{"description":"Return a list of available advisory feed names","operationId":"v4ListAdvisoryFeeds","responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/search.V4ListFeedReturnValue"}}},"description":"OK"},"400":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/search.ErrorResponse"}}},"description":"Bad Request"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/search.ErrorResponse"}}},"description":"Unauthorized"},"402":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/search.ErrorResponse"}}},"description":"Payment Required"},"503":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/search.ErrorResponse"}}},"description":"Service Unavailable"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"List advisory feeds","tags":["advisory"]}},"/v4/backup":{"get":{"description":"Returns the list of advisory feeds for which a backup can be requested","operationId":"v4ListBackups","responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/backup.ListBackupsResponse"}}},"description":"OK"},"401":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Unauthorized"},"503":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Service Unavailable"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"List available backups","tags":["backup"]}},"/v4/backup/{index}":{"get":{"description":"Validates the feed, generates a fresh backup zip if the source parquet is newer, and returns a pre-signed download URL","operationId":"v4GetBackupByName","parameters":[{"description":"Feed name (e.g. 'vulncheck')","in":"path","name":"index","required":true,"schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/backup.BackupResponse"}}},"description":"OK"},"401":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Unauthorized"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"503":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Service Unavailable"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Get backup by feed name","tags":["backup"]}}},"servers":[{"url":"https://api.vulncheck.com"}]} \ No newline at end of file +{"components":{"schemas":{"advisory.A10":{"description":"advisory.A10","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"reference":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ABBAdvisory":{"description":"advisory.ABBAdvisory","properties":{"abb_vulnerability_id":{"items":{"type":"string"},"type":"array","uniqueItems":false},"csaf":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"document_id":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ADP":{"description":"advisory.ADP","properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.MAffected"},"type":"array","uniqueItems":false},"metrics":{"items":{"$ref":"#/components/schemas/advisory.VulnrichmentMetric"},"type":"array","uniqueItems":false},"providerMetadata":{"$ref":"#/components/schemas/advisory.MProviderMetadata"}},"type":"object"},"advisory.ADPContainer":{"description":"advisory.ADPContainer","properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.MAffected"},"type":"array","uniqueItems":false},"datePublic":{"description":"OK","type":"string"},"descriptions":{"description":"OK","items":{"$ref":"#/components/schemas/advisory.MDescriptions"},"type":"array","uniqueItems":false},"impacts":{"description":"OK","items":{"$ref":"#/components/schemas/advisory.Impact"},"type":"array","uniqueItems":false},"metrics":{"description":"OK","items":{"$ref":"#/components/schemas/advisory.Metric"},"type":"array","uniqueItems":false},"problemTypes":{"description":"OK","items":{"$ref":"#/components/schemas/advisory.MProblemTypes"},"type":"array","uniqueItems":false},"providerMetadata":{"$ref":"#/components/schemas/advisory.MProviderMetadata"},"references":{"items":{"$ref":"#/components/schemas/advisory.MReference"},"type":"array","uniqueItems":false},"tags":{"description":"OK","items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"description":"OK","type":"string"}},"type":"object"},"advisory.AIX":{"description":"advisory.AIX","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AMD":{"description":"advisory.AMD","properties":{"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_updated":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AMI":{"description":"advisory.AMI","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ASRG":{"description":"advisory.ASRG","properties":{"affected_products":{"type":"string"},"capec":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"problem_type":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AVEVAAdvisory":{"description":"advisory.AVEVAAdvisory","properties":{"aveva_vulnerability_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"published_by":{"type":"string"},"rating":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AVIDMLAdvs":{"description":"advisory.AVIDMLAdvs","properties":{"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AWS":{"description":"advisory.AWS","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Abbott":{"description":"advisory.Abbott","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Absolute":{"description":"advisory.Absolute","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Acknowledgement":{"description":"advisory.Acknowledgement","properties":{"name":{"items":{"$ref":"#/components/schemas/advisory.IVal"},"type":"array","uniqueItems":false},"url":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.Acronis":{"description":"advisory.Acronis","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AdobeAdvisory":{"description":"advisory.AdobeAdvisory","properties":{"adobe_cves":{"items":{"$ref":"#/components/schemas/advisory.AdobeCVE"},"type":"array","uniqueItems":false},"affected":{"items":{"$ref":"#/components/schemas/advisory.AdobeAffected"},"type":"array"},"bulletinId":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"link":{"type":"string"},"solutions":{"items":{"$ref":"#/components/schemas/advisory.AdobeSolution"},"type":"array"},"updated_at":{"type":"string"}},"type":"object"},"advisory.AdobeAffected":{"description":"advisory.AdobeAffected","properties":{"platform":{"type":"string"},"product":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.AdobeCVE":{"description":"advisory.AdobeCVE","properties":{"cve":{"type":"string"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"}},"type":"object"},"advisory.AdobeSolution":{"description":"advisory.AdobeSolution","properties":{"platform":{"type":"string"},"product":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Advantech":{"description":"advisory.Advantech","properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Advisory":{"description":"advisory.Advisory","properties":{"affects":{"type":"string"},"announced":{"type":"string"},"category":{"type":"string"},"corrections":{"items":{"$ref":"#/components/schemas/advisory.Correction"},"type":"array"},"credits":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"module":{"type":"string"},"name":{"type":"string"},"topic":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AdvisoryDetails":{"description":"advisory.AdvisoryDetails","properties":{"bugzilla":{"$ref":"#/components/schemas/advisory.Bugzilla"},"cve":{"$ref":"#/components/schemas/advisory.OvalCVE"},"issued":{"$ref":"#/components/schemas/advisory.Issued"},"severity":{"type":"string"},"updated":{"$ref":"#/components/schemas/advisory.Updated"}},"type":"object"},"advisory.AdvisoryRecord":{"description":"advisory.AdvisoryRecord","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"external_id":{"items":{"type":"string"},"type":"array","uniqueItems":false},"lang":{"type":"string"},"name":{"type":"string"},"refsource":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.Affected":{"description":"advisory.Affected","properties":{"database_specific":{"description":"The meaning of the values within the object is entirely defined by the database"},"ecosystem_specific":{"description":"The meaning of the values within the object is entirely defined by the ecosystem"},"package":{"$ref":"#/components/schemas/advisory.OSVPackage"},"ranges":{"items":{"$ref":"#/components/schemas/advisory.Range"},"type":"array","uniqueItems":false},"severity":{"items":{"$ref":"#/components/schemas/advisory.Severity"},"type":"array","uniqueItems":false},"versions":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.AffectedChrome":{"description":"advisory.AffectedChrome","properties":{"fixed_version":{"type":"string"},"product":{"type":"string"}},"type":"object"},"advisory.AffectedDebianPackage":{"description":"advisory.AffectedDebianPackage","properties":{"name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.AffectedDebianRelease":{"description":"advisory.AffectedDebianRelease","properties":{"fixed_version":{"type":"string"},"nodsa":{"type":"string"},"nodsa_reason":{"type":"string"},"release_name":{"type":"string"},"repositories":{"items":{"$ref":"#/components/schemas/advisory.AffectedDebianRepository"},"type":"array","uniqueItems":false},"status":{"type":"string"},"urgency":{"type":"string"}},"type":"object"},"advisory.AffectedDebianRepository":{"description":"advisory.AffectedDebianRepository","properties":{"repository_name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.AffectedFile":{"description":"advisory.AffectedFile","properties":{"file_last_modified":{"type":"string"},"file_name":{"type":"string"}},"type":"object"},"advisory.AffectedProduct":{"description":"advisory.AffectedProduct","properties":{"affectedReleases":{"type":"string"},"fixedReleases":{"type":"string"},"lexmarkModels":{"type":"string"}},"type":"object"},"advisory.AffectedRel":{"description":"advisory.AffectedRel","properties":{"advisory":{"type":"string"},"cpe":{"type":"string"},"package":{"type":"string"},"product_name":{"type":"string"},"release_date":{"type":"string"}},"type":"object"},"advisory.AffectedUbuntuPackage":{"description":"advisory.AffectedUbuntuPackage","properties":{"break_commit_url":{"items":{"type":"string"},"type":"array","uniqueItems":false},"fix_commit_url":{"items":{"type":"string"},"type":"array","uniqueItems":false},"package_name":{"type":"string"},"package_release_status":{"items":{"$ref":"#/components/schemas/advisory.UbuntuPackageReleaseStatus"},"type":"array","uniqueItems":false},"upstream_fix_url":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.AlephResearch":{"description":"advisory.AlephResearch","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Alibaba":{"description":"advisory.Alibaba","properties":{"cnnvd":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cnvd":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"mitigation_cn":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary_cn":{"type":"string"},"title_cn":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AlmaDate":{"description":"advisory.AlmaDate","properties":{"$date":{"type":"integer"}},"type":"object"},"advisory.AlmaLinuxUpdate":{"description":"advisory.AlmaLinuxUpdate","properties":{"bs_repo_id":{"$ref":"#/components/schemas/advisory.AlmaObjectID"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"fromstr":{"type":"string"},"id":{"$ref":"#/components/schemas/advisory.AlmaObjectID"},"issued_date":{"$ref":"#/components/schemas/advisory.AlmaDate"},"pkglist":{"$ref":"#/components/schemas/advisory.AlmaPackageList"},"pushcount":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.AlmaReference"},"type":"array","uniqueItems":false},"release":{"type":"string"},"rights":{"type":"string"},"severity":{"type":"string"},"solution":{"type":"string"},"status":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"},"update_url":{"type":"string"},"updated_date":{"$ref":"#/components/schemas/advisory.AlmaDate"},"updateinfo_id":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.AlmaObjectID":{"description":"advisory.AlmaObjectID","properties":{"$oid":{"type":"string"}},"type":"object"},"advisory.AlmaPackage":{"description":"advisory.AlmaPackage","properties":{"arch":{"type":"string"},"epoch":{"type":"string"},"filename":{"type":"string"},"name":{"type":"string"},"reboot_suggested":{"type":"integer"},"release":{"type":"string"},"source":{"type":"string"},"sum":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.AlmaPackageList":{"description":"advisory.AlmaPackageList","properties":{"name":{"type":"string"},"packages":{"items":{"$ref":"#/components/schemas/advisory.AlmaPackage"},"type":"array","uniqueItems":false},"shortname":{"type":"string"}},"type":"object"},"advisory.AlmaReference":{"description":"advisory.AlmaReference","properties":{"href":{"type":"string"},"id":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.AlpineLinuxSecDB":{"description":"advisory.AlpineLinuxSecDB","properties":{"apkurl":{"type":"string"},"archs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"distroversion":{"type":"string"},"packages":{"items":{"$ref":"#/components/schemas/advisory.AlpineLinuxSecDBPackage"},"type":"array","uniqueItems":false},"reponame":{"type":"string"},"urlprefix":{"type":"string"}},"type":"object"},"advisory.AlpineLinuxSecDBPackage":{"description":"advisory.AlpineLinuxSecDBPackage","properties":{"package_name":{"type":"string"},"secfixes":{"items":{"$ref":"#/components/schemas/advisory.AlpineLinuxSecurityFix"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.AlpineLinuxSecurityFix":{"description":"advisory.AlpineLinuxSecurityFix","properties":{"cve":{"type":"string"},"fixed_version":{"type":"string"}},"type":"object"},"advisory.AmazonAffectedPackage":{"description":"advisory.AmazonAffectedPackage","properties":{"advisory":{"type":"string"},"package":{"type":"string"},"platform":{"type":"string"},"releaseDate":{"type":"string"},"status":{"type":"string"}},"type":"object"},"advisory.AmazonCVE":{"description":"advisory.AmazonCVE","properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.AmazonAffectedPackage"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AnchoreNVDOverride":{"description":"advisory.AnchoreNVDOverride","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"override":{"$ref":"#/components/schemas/advisory.Override"},"url":{"type":"string"}},"type":"object"},"advisory.AndroidAdvisory":{"description":"advisory.AndroidAdvisory","properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.AndroidAffected"},"type":"array","uniqueItems":false},"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.AndroidReference"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AndroidAffected":{"description":"advisory.AndroidAffected","properties":{"ecosystem_specific":{"$ref":"#/components/schemas/advisory.EcoSystem"},"package":{"$ref":"#/components/schemas/advisory.AndroidPackage"},"ranges":{"items":{"$ref":"#/components/schemas/advisory.AndroidRange"},"type":"array","uniqueItems":false},"versions":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.AndroidEvent":{"description":"advisory.AndroidEvent","properties":{"fixed":{"type":"string"},"introduced":{"type":"string"}},"type":"object"},"advisory.AndroidPackage":{"description":"advisory.AndroidPackage","properties":{"ecosystem":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.AndroidRange":{"description":"advisory.AndroidRange","properties":{"events":{"items":{"$ref":"#/components/schemas/advisory.AndroidEvent"},"type":"array","uniqueItems":false},"type":{"type":"string"}},"type":"object"},"advisory.AndroidReference":{"description":"advisory.AndroidReference","properties":{"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheActiveMQ":{"description":"advisory.ApacheActiveMQ","properties":{"affected_versions":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheArchiva":{"description":"advisory.ApacheArchiva","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheArrow":{"description":"advisory.ApacheArrow","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheCamel":{"description":"advisory.ApacheCamel","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheCommons":{"description":"advisory.ApacheCommons","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheCouchDB":{"description":"advisory.ApacheCouchDB","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheFlink":{"description":"advisory.ApacheFlink","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.ApacheGuacamole":{"description":"advisory.ApacheGuacamole","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheHTTP":{"description":"advisory.ApacheHTTP","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheHadoop":{"description":"advisory.ApacheHadoop","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheJSPWiki":{"description":"advisory.ApacheJSPWiki","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheKafka":{"description":"advisory.ApacheKafka","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheLoggingServices":{"description":"advisory.ApacheLoggingServices","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheNiFi":{"description":"advisory.ApacheNiFi","properties":{"affected_version":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed_versions":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheOFBiz":{"description":"advisory.ApacheOFBiz","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.ApacheOpenMeetings":{"description":"advisory.ApacheOpenMeetings","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheOpenOffice":{"description":"advisory.ApacheOpenOffice","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApachePulsar":{"description":"advisory.ApachePulsar","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheShiro":{"description":"advisory.ApacheShiro","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheSpark":{"description":"advisory.ApacheSpark","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheStruts":{"description":"advisory.ApacheStruts","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"impact":{"type":"string"},"rating":{"type":"string"},"remediation":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vulnerable_version":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.ApacheSubversion":{"description":"advisory.ApacheSubversion","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheSuperset":{"description":"advisory.ApacheSuperset","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheTomcat":{"description":"advisory.ApacheTomcat","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheZooKeeper":{"description":"advisory.ApacheZooKeeper","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AppCheck":{"description":"advisory.AppCheck","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Appgate":{"description":"advisory.Appgate","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AppleAdvisory":{"description":"advisory.AppleAdvisory","properties":{"components":{"items":{"$ref":"#/components/schemas/advisory.AppleComponent"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"name":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AppleComponent":{"description":"advisory.AppleComponent","properties":{"available_for":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"description":{"type":"string"},"impact":{"type":"string"},"itw_exploit":{"type":"boolean"},"name":{"type":"string"}},"type":"object"},"advisory.ArchIssue":{"description":"advisory.ArchIssue","properties":{"advisories":{"items":{"type":"string"},"type":"array"},"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"issues":{"description":"cves","items":{"type":"string"},"type":"array"},"name":{"type":"string"},"packages":{"items":{"type":"string"},"type":"array"},"references":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"status":{"type":"string"},"ticket":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.Arista":{"description":"advisory.Arista","properties":{"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Aruba":{"description":"advisory.Aruba","properties":{"csaf":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AssetNote":{"description":"advisory.AssetNote","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Asterisk":{"description":"advisory.Asterisk","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Astra":{"description":"advisory.Astra","properties":{"bdu":{"items":{"type":"string"},"type":"array","uniqueItems":false},"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary_ru":{"type":"string"},"title_ru":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Asus":{"description":"advisory.Asus","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"type":"string"},"id":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.AtlassianAdvisory":{"description":"advisory.AtlassianAdvisory","properties":{"affected_version":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"detailed_summary":{"description":"overloading in places with 'RiskAssessment' and other places with\n'Description'","type":"string"},"fixed_version":{"type":"string"},"link":{"type":"string"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"release_date":{"type":"string"},"severity":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.AtlassianProducts":{"description":"advisory.AtlassianProducts","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"name":{"type":"string"}},"type":"object"},"advisory.AtlassianVuln":{"description":"advisory.AtlassianVuln","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"products":{"items":{"$ref":"#/components/schemas/advisory.AtlassianProducts"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Atredis":{"description":"advisory.Atredis","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vendors":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.Audiocodes":{"description":"advisory.Audiocodes","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AusCert":{"description":"advisory.AusCert","properties":{"body":{"type":"string"},"bulletinId":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"link":{"type":"string"},"operatingSystem":{"type":"string"},"product":{"type":"string"},"publisher":{"type":"string"},"resolution":{"type":"string"}},"type":"object"},"advisory.Autodesk":{"description":"advisory.Autodesk","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Avaya":{"description":"advisory.Avaya","properties":{"advisory_number":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"last_revised":{"type":"string"},"overview":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Avigilon":{"description":"advisory.Avigilon","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Award":{"description":"advisory.Award","properties":{"amount":{"type":"string"},"currency":{"type":"string"}},"type":"object"},"advisory.Axis":{"description":"advisory.Axis","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Azul":{"description":"advisory.Azul","properties":{"base_score":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"prime_version":{"items":{"$ref":"#/components/schemas/advisory.PrimeVersion"},"type":"array","uniqueItems":false},"release":{"type":"string"},"url":{"type":"string"},"zulu_version":{"items":{"$ref":"#/components/schemas/advisory.ZuluVersion"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.BBraunAdvisory":{"description":"advisory.BBraunAdvisory","properties":{"attention":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"equipment":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"},"vulnerabilities":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.BDUAdvisory":{"description":"advisory.BDUAdvisory","properties":{"bdu_id":{"description":"BDU:2022-03833","type":"string"},"cve":{"description":"[]string{\"CVE-2022-28194\"}","items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"$ref":"#/components/schemas/advisory.BDUCvss"},"cvss3":{"$ref":"#/components/schemas/advisory.BDUCvss3"},"cwe":{"description":"CWE-119","type":"string"},"date_added":{"type":"string"},"description_ru":{"description":"Библиотека libxml2 до версии 2.9.12 не корректно обрабатывает XML-документы, содержащие определенные сущности. В результате могут быть выполнены произвольные команды.","type":"string"},"environment":{"$ref":"#/components/schemas/advisory.BDUEnvironment"},"exploit_status_en":{"description":"Exploited","type":"string"},"exploit_status_ru":{"description":"Exploited","type":"string"},"fix_status_en":{"description":"Fixed","type":"string"},"fix_status_ru":{"description":"Fixed","type":"string"},"identify_date":{"description":"2022-09-01","type":"string"},"name_ru":{"description":"BDU:2022-03833: Уязвимость модуля Cboot (tegrabl_cbo.c) пакета драйверов микропрограммного обеспечения вычислительных плат NVIDIA Jetson, позволяющая нарушителю выполнить произвольный код или вызвать частичный отказ в обслуживании","type":"string"},"severity_ru":{"description":"High","type":"string"},"solution_ru":{"description":"Обновите драйверы микропрограммного обеспечения вычислительных плат NVIDIA Jetson до версии 32.6.1 или более поздней","type":"string"},"sources":{"description":"https://nvd.nist.gov/vuln/detail/CVE-2022-28194","items":{"type":"string"},"type":"array","uniqueItems":false},"text_ru":{"description":"Библиотека libxml2 до версии 2.9.12 не корректно обрабатывает XML-документы, содержащие определенные сущности. В результате могут быть выполнены произвольные команды.","type":"string"},"url":{"description":"https://bdu.fstec.ru/vul/2022-03833","type":"string"},"vul_status_en":{"description":"Exploitable","type":"string"},"vul_status_ru":{"description":"Exploitable","type":"string"},"vulnerable_software":{"$ref":"#/components/schemas/advisory.BDUVulnerableSoftware"}},"type":"object"},"advisory.BDUCvss":{"description":"advisory.BDUCvss","properties":{"vector":{"$ref":"#/components/schemas/advisory.BDUVector"}},"type":"object"},"advisory.BDUCvss3":{"description":"advisory.BDUCvss3","properties":{"vector":{"$ref":"#/components/schemas/advisory.BDUVector"}},"type":"object"},"advisory.BDUEnvironment":{"description":"advisory.BDUEnvironment","properties":{"os":{"$ref":"#/components/schemas/advisory.BDUOs"}},"type":"object"},"advisory.BDUOs":{"description":"advisory.BDUOs","properties":{"name":{"type":"string"},"platform":{"type":"string"},"text":{"type":"string"},"vendor":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.BDUSoft":{"description":"advisory.BDUSoft","properties":{"name":{"type":"string"},"platform":{"type":"string"},"text":{"type":"string"},"types":{"$ref":"#/components/schemas/advisory.BDUTypes"},"vendor":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.BDUTypes":{"description":"advisory.BDUTypes","properties":{"text":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.BDUVector":{"description":"advisory.BDUVector","properties":{"score":{"type":"string"},"text":{"type":"string"}},"type":"object"},"advisory.BDUVulnerableSoftware":{"description":"advisory.BDUVulnerableSoftware","properties":{"soft":{"$ref":"#/components/schemas/advisory.BDUSoft"}},"type":"object"},"advisory.BLS":{"description":"advisory.BLS","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"prodcut":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.Bandr":{"description":"advisory.Bandr","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"document_id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BaxterAdvisory":{"description":"advisory.BaxterAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_updated":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BeckhoffAdvisory":{"description":"advisory.BeckhoffAdvisory","properties":{"beckhoff_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_revised":{"description":"if in the future we can delete this great - it's just a dupe to\nnormalize the field names","type":"string"},"name":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vde":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.BeckmanCoulter":{"description":"advisory.BeckmanCoulter","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BectonDickinsonAdvisory":{"description":"advisory.BectonDickinsonAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"products_affected":{"items":{"$ref":"#/components/schemas/advisory.ProductsAffected"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BeldenAdvisory":{"description":"advisory.BeldenAdvisory","properties":{"belden_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_updated":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.BeyondTrust":{"description":"advisory.BeyondTrust","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Binarly":{"description":"advisory.Binarly","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BitDefender":{"description":"advisory.BitDefender","properties":{"additional_details":{"type":"string"},"affected_products":{"type":"string"},"affected_vendors":{"type":"string"},"credit":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"details":{"type":"string"},"timeline":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BlackBerry":{"description":"advisory.BlackBerry","properties":{"bsrt":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BoschAdvisory":{"description":"advisory.BoschAdvisory","properties":{"bosch_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BostonScientificAdvisory":{"description":"advisory.BostonScientificAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Botnet":{"description":"advisory.Botnet","properties":{"associated_capecs":{"items":{"$ref":"#/components/schemas/advisory.Capec"},"type":"array","uniqueItems":false},"associated_cwes":{"items":{"$ref":"#/components/schemas/advisory.CweData"},"type":"array","uniqueItems":false},"associated_mitre_attack_techniques":{"items":{"$ref":"#/components/schemas/advisory.MitreAttackTechWithRefs"},"type":"array","uniqueItems":false},"botnet_name":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve_references":{"items":{"$ref":"#/components/schemas/advisory.CVEReference"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"malpedia_url":{"type":"string"},"tools":{"items":{"$ref":"#/components/schemas/advisory.Tool"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.Bugzilla":{"description":"advisory.Bugzilla","properties":{"href":{"type":"string"},"id":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.CACyberCentreAdvisory":{"description":"advisory.CACyberCentreAdvisory","properties":{"control_systems":{"type":"boolean"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"html_url":{"type":"string"},"serial_number":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.CBLMariner":{"description":"advisory.CBLMariner","properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"package":{"type":"string"},"severity":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.CERTEUAdvisory":{"description":"advisory.CERTEUAdvisory","properties":{"advisoryId":{"type":"string"},"affectedProducts":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"history":{"items":{"type":"string"},"type":"array"},"link":{"type":"string"},"recommendations":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"technicalDetails":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.CESA":{"description":"advisory.CESA","properties":{"arch":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"issueDate":{"type":"string"},"osRelease":{"type":"string"},"packages":{"items":{"$ref":"#/components/schemas/advisory.CentosPackage"},"type":"array"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"}},"type":"object"},"advisory.CISAAlert":{"description":"advisory.CISAAlert","properties":{"AffectedProducts":{"type":"string"},"AlertID":{"type":"string"},"Archived":{"type":"boolean"},"CVEExploitedITW":{"type":"boolean"},"CVSS":{"type":"string"},"ICSMA":{"type":"boolean"},"Mitigations":{"type":"string"},"ReleaseDate":{"type":"string"},"Title":{"type":"string"},"Url":{"type":"string"},"Vendor":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.CISControl":{"description":"advisory.CISControl","properties":{"cis_control_description":{"type":"string"},"cis_control_id":{"type":"string"},"cis_control_name":{"type":"string"}},"type":"object"},"advisory.CNNVDEntryJSON":{"description":"advisory.CNNVDEntryJSON","properties":{"bugtraq-id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"modified-date":{"type":"string"},"name_cn":{"type":"string"},"published-date":{"type":"string"},"severity_cn":{"type":"string"},"severity_en":{"type":"string"},"source":{"type":"string"},"url":{"type":"string"},"vuln-description_cn":{"type":"string"},"vuln-solution":{"type":"string"},"vuln-type_cn":{"type":"string"},"vuln-type_en":{"type":"string"}},"type":"object"},"advisory.CNVDBulletin":{"description":"advisory.CNVDBulletin","properties":{"cnta":{"type":"string"},"cnvd":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"reference_urls":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CNVDFlaw":{"description":"advisory.CNVDFlaw","properties":{"affected_products_cn":{"type":"string"},"bugtraq_id":{"type":"string"},"cnvd":{"type":"string"},"collection_time":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"harm_level":{"type":"string"},"id":{"type":"string"},"public_date":{"type":"string"},"reference_urls":{"items":{"type":"string"},"type":"array","uniqueItems":false},"submission_time":{"type":"string"},"title_cn":{"type":"string"},"update_time":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"validation_info_cn":{"type":"string"},"validation_info_en":{"type":"string"},"vendor_patch_cn":{"type":"string"},"vuln_attachments":{"items":{"type":"string"},"type":"array","uniqueItems":false},"vuln_description_cn":{"type":"string"},"vuln_solution_cn":{"type":"string"},"vuln_type_cn":{"type":"string"}},"type":"object"},"advisory.COSUpdate":{"description":"advisory.COSUpdate","properties":{"changed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"featured":{"items":{"type":"string"},"type":"array","uniqueItems":false},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"id":{"type":"string"},"reference":{"type":"string"},"security":{"items":{"type":"string"},"type":"array","uniqueItems":false},"updated":{"type":"string"}},"type":"object"},"advisory.CPEMatch":{"description":"advisory.CPEMatch","properties":{"criteria":{"type":"string"},"matchCriteriaId":{"type":"string"},"vulnerable":{"type":"boolean"}},"type":"object"},"advisory.CPENode":{"description":"advisory.CPENode","properties":{"cpeMatch":{"items":{"$ref":"#/components/schemas/advisory.CPEMatch"},"type":"array","uniqueItems":false},"negate":{"type":"boolean"},"operator":{"type":"string"}},"type":"object"},"advisory.CSAF":{"description":"advisory.CSAF","properties":{"document":{"$ref":"#/components/schemas/advisory.DocumentMetadata"},"notes":{"description":"Notes holds notes associated with the whole document.\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3217-document-property---notes","items":{"$ref":"#/components/schemas/advisory.CSAFNote"},"type":"array","uniqueItems":false},"product_tree":{"$ref":"#/components/schemas/advisory.ProductBranch"},"vulnerabilities":{"description":"Vulnerabilities contains information about the vulnerabilities,\n(i.e. CVEs), associated threats, and product status.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#323-vulnerabilities-property","items":{"$ref":"#/components/schemas/advisory.CSAFVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CSAFDistribution":{"description":"advisory.CSAFDistribution","type":"object"},"advisory.CSAFNote":{"description":"advisory.CSAFNote","properties":{"audience":{"type":"string"},"category":{"type":"string"},"text":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.CSAFReference":{"description":"advisory.CSAFReference","properties":{"category":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CSAFRelationship":{"description":"advisory.CSAFRelationship","properties":{"category":{"type":"string"},"full_product_name":{"$ref":"#/components/schemas/advisory.Product"},"product_reference":{"type":"string"},"relates_to_product_reference":{"type":"string"}},"type":"object"},"advisory.CSAFScore":{"description":"advisory.CSAFScore","properties":{"cvss_v2":{"$ref":"#/components/schemas/advisory.CVSSV2"},"cvss_v3":{"$ref":"#/components/schemas/advisory.CVSSV3"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CSAFVulnerability":{"description":"advisory.CSAFVulnerability","properties":{"cve":{"description":"MITRE standard Common Vulnerabilities and Exposures (CVE) tracking number for the vulnerability.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3232-vulnerabilities-property---cve","type":"string"},"cwe":{"$ref":"#/components/schemas/advisory.Cwe"},"flags":{"description":"Machine readable flags for products related to vulnerability\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3235-vulnerabilities-property---flags","items":{"$ref":"#/components/schemas/advisory.Flag"},"type":"array","uniqueItems":false},"ids":{"description":"List of IDs represents a list of unique labels or tracking IDs for the vulnerability (if such information exists).\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3236-vulnerabilities-property---ids","items":{"$ref":"#/components/schemas/advisory.TrackingID"},"type":"array","uniqueItems":false},"notes":{"description":"Notes holds notes associated with the Vulnerability object.\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3238-vulnerabilities-property---notes","items":{"$ref":"#/components/schemas/advisory.CSAFNote"},"type":"array","uniqueItems":false},"product_status":{"additionalProperties":{"items":{"type":"string"},"type":"array"},"description":"Provide details on the status of the referenced product related to the vulnerability.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3239-vulnerabilities-property---product-status","type":"object"},"references":{"description":"Vulnerability references holds a list of references associated with this vulnerability item.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#32310-vulnerabilities-property---references","items":{"$ref":"#/components/schemas/advisory.CSAFReference"},"type":"array","uniqueItems":false},"release_date":{"type":"string"},"remediations":{"description":"Provide details of remediations associated with a Vulnerability\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#32312-vulnerabilities-property---remediations","items":{"$ref":"#/components/schemas/advisory.RemediationData"},"type":"array","uniqueItems":false},"scores":{"description":"Scores holds the scores associated with the Vulnerability object.\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#32313-vulnerabilities-property---scores\nCurrently only CVSS v3 is supported.","items":{"$ref":"#/components/schemas/advisory.CSAFScore"},"type":"array","uniqueItems":false},"threats":{"description":"Provide details of threats associated with a vulnerability.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#32314-vulnerabilities-property---threats","items":{"$ref":"#/components/schemas/advisory.ThreatData"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CVEDetail":{"description":"advisory.CVEDetail","properties":{"baseScore":{"type":"string"},"cveid":{"type":"string"},"description":{"type":"string"},"vector":{"type":"string"}},"type":"object"},"advisory.CVEDetailsLink":{"description":"advisory.CVEDetailsLink","properties":{"url":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.CVEReference":{"description":"advisory.CVEReference","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CVSS":{"description":"advisory.CVSS","properties":{"score":{"type":"string"},"severity":{"type":"string"},"type":{"type":"string"},"vector":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.CVSSV2":{"description":"advisory.CVSSV2","properties":{"accessComplexity":{"type":"string"},"accessVector":{"type":"string"},"authentication":{"type":"string"},"availabilityImpact":{"type":"string"},"availabilityRequirement":{"type":"string"},"baseScore":{"type":"number"},"collateralDamagePotential":{"type":"string"},"confidentialityImpact":{"type":"string"},"confidentialityRequirement":{"type":"string"},"environmentalScore":{"type":"number"},"exploitability":{"type":"string"},"integrityImpact":{"type":"string"},"integrityRequirement":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"targetDistribution":{"type":"string"},"temporalScore":{"type":"number"}},"type":"object"},"advisory.CVSSV3":{"description":"advisory.CVSSV3","properties":{"attackComplexity":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"scope":{"type":"string"},"userInteraction":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.CVSSV40":{"description":"this isn't called baseMetric, because it can contain other metrics -- typically supplemental metrics","properties":{"Automatable":{"type":"string"},"Recovery":{"type":"string"},"Safety":{"type":"string"},"attackComplexity":{"type":"string"},"attackRequirements":{"type":"string"},"attackVector":{"type":"string"},"availabilityRequirement":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityRequirement":{"type":"string"},"exploitMaturity":{"type":"string"},"integrityRequirement":{"type":"string"},"modifiedAttackComplexity":{"type":"string"},"modifiedAttackRequirements":{"type":"string"},"modifiedAttackVector":{"type":"string"},"modifiedPrivilegesRequired":{"type":"string"},"modifiedSubAvailabilityImpact":{"type":"string"},"modifiedSubConfidentialityImpact":{"type":"string"},"modifiedSubIntegrityImpact":{"type":"string"},"modifiedUserInteraction":{"type":"string"},"modifiedVulnAvailabilityImpact":{"type":"string"},"modifiedVulnConfidentialityImpact":{"type":"string"},"modifiedVulnIntegrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"providerUrgency":{"type":"string"},"subAvailabilityImpact":{"type":"string"},"subConfidentialityImpact":{"type":"string"},"subIntegrityImpact":{"type":"string"},"userInteraction":{"type":"string"},"valueDensity":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"},"vulnAvailabilityImpact":{"type":"string"},"vulnConfidentialityImpact":{"type":"string"},"vulnIntegrityImpact":{"type":"string"},"vulnerabilityResponseEffort":{"type":"string"}},"type":"object"},"advisory.CVSSV40Threat":{"description":"advisory.CVSSV40Threat","properties":{"baseThreatScore":{"type":"number"},"baseThreatSeverity":{"type":"string"},"exploitMaturity":{"type":"string"}},"type":"object"},"advisory.CWENode":{"description":"advisory.CWENode","type":"object"},"advisory.CanvasExploit":{"description":"advisory.CanvasExploit","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"exploit_pack":{"type":"string"},"name":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Capec":{"description":"advisory.Capec","properties":{"capec_id":{"type":"string"},"capec_name":{"type":"string"},"capec_url":{"type":"string"},"lang":{"type":"string"}},"type":"object"},"advisory.CarestreamAdvisory":{"description":"advisory.CarestreamAdvisory","properties":{"carestream_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_updated":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Carrier":{"description":"advisory.Carrier","properties":{"advisory_id":{"type":"string"},"affected_product":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CentosPackage":{"description":"advisory.CentosPackage","properties":{"filename":{"type":"string"},"name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.CertBE":{"description":"advisory.CertBE","properties":{"affected_software":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"risk":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vulnerability_type":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CertFRAdvisory":{"description":"advisory.CertFRAdvisory","properties":{"affected_systems_fr":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"reference":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"resume_fr":{"type":"string"},"risks_fr":{"type":"string"},"solution_fr":{"type":"string"},"source_fr":{"type":"string"},"title_fr":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CertIN":{"description":"advisory.CertIN","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CertIRSecurityAlert":{"description":"advisory.CertIRSecurityAlert","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary_fa":{"type":"string"},"title_fa":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CertSE":{"description":"advisory.CertSE","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary_sv":{"type":"string"},"title_sv":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CertUA":{"description":"advisory.CertUA","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary_ua":{"type":"string"},"title_ua":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ChainGuard":{"description":"advisory.ChainGuard","properties":{"apkurl":{"type":"string"},"archs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"description":"un-used","type":"string"},"packages":{"items":{"$ref":"#/components/schemas/advisory.ChainGuardPackage"},"type":"array","uniqueItems":false},"reponame":{"type":"string"},"urlprefix":{"type":"string"}},"type":"object"},"advisory.ChainGuardPackage":{"description":"advisory.ChainGuardPackage","properties":{"name":{"type":"string"},"secfixes":{"items":{"$ref":"#/components/schemas/advisory.ChainGuardSecFix"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.ChainGuardSecFix":{"description":"advisory.ChainGuardSecFix","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"version":{"type":"string"}},"type":"object"},"advisory.CheckPoint":{"description":"advisory.CheckPoint","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_updated":{"type":"string"},"reference":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Chrome":{"description":"advisory.Chrome","properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.AffectedChrome"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Ciena":{"description":"advisory.Ciena","properties":{"cves":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"issue_no":{"type":"integer"},"security_advisory_number":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vulnerable_products":{"items":{"$ref":"#/components/schemas/advisory.VulnerableProduct"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CisaCsafAdv":{"description":"advisory.CisaCsafAdv","properties":{"csaf_json":{"$ref":"#/components/schemas/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CiscoAdvisory":{"description":"advisory.CiscoAdvisory","properties":{"ciscoBugId":{"description":"multiple","type":"string"},"csaf":{"type":"string"},"cve":{"description":"multiple","items":{"type":"string"},"type":"array","uniqueItems":false},"cvrf":{"type":"string"},"cwe":{"description":"multiple","type":"string"},"date_added":{"type":"string"},"id":{"type":"integer"},"identifier":{"type":"string"},"name":{"type":"string"},"related_resources":{"type":"string"},"severity":{"type":"string"},"status":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"totalCount":{"type":"integer"},"updated_at":{"type":"string"},"url":{"type":"string"},"version":{"type":"string"},"workarounds":{"type":"string"},"workflowStatus":{"type":"string"}},"type":"object"},"advisory.CiscoCSAF":{"description":"advisory.CiscoCSAF","properties":{"csaf":{},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"identifier":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CiscoKnownGoodValue":{"description":"advisory.CiscoKnownGoodValue","properties":{"biv_category":{"type":"string"},"biv_hash":{"type":"string"},"date_added":{"type":"string"},"dtype":{"type":"string"},"filename":{"type":"string"},"md5":{"type":"string"},"platform":{"type":"string"},"published":{"type":"string"},"sha1":{"type":"string"},"sha256":{"type":"string"},"sha512":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.CitrixAdvisory":{"description":"advisory.CitrixAdvisory","properties":{"citrixId":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"link":{"type":"string"},"products":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.ClarotyVulnerability":{"description":"advisory.ClarotyVulnerability","properties":{"advisory_url":{"type":"string"},"claroty_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_v3":{"type":"number"},"cwe":{"type":"string"},"date_added":{"type":"string"},"product":{"type":"string"},"target":{"type":"string"},"vendor":{"type":"string"},"vendor_advisory_url":{"type":"string"}},"type":"object"},"advisory.CloudBees":{"description":"advisory.CloudBees","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CloudVulnDBAdvisory":{"description":"advisory.CloudVulnDBAdvisory","properties":{"affectedServices":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"}},"type":"object"},"advisory.CodesysAdvisory":{"description":"advisory.CodesysAdvisory","properties":{"codesys_id":{"type":"string"},"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CommVault":{"description":"advisory.CommVault","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve_details":{"items":{"$ref":"#/components/schemas/advisory.CommVaultCVEDetails"},"type":"array","uniqueItems":false},"cvss_range":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"impacted_product":{"$ref":"#/components/schemas/advisory.CommVaultImpactedProduct"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"resolution":{"$ref":"#/components/schemas/advisory.CommVaultResolution"},"severity":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CommVaultCVEDetails":{"description":"advisory.CommVaultCVEDetails","properties":{"cve_id":{"type":"string"},"cvss":{"type":"string"},"description":{"type":"string"},"external_links":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CommVaultImpactedProduct":{"description":"advisory.CommVaultImpactedProduct","properties":{"description":{"type":"string"},"impacted_product_details":{"items":{"$ref":"#/components/schemas/advisory.CommVaultImpactedProductDetails"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CommVaultImpactedProductDetails":{"description":"advisory.CommVaultImpactedProductDetails","properties":{"affected_versions":{"type":"string"},"platforms":{"items":{"type":"string"},"type":"array","uniqueItems":false},"product_name":{"type":"string"},"resolved_versions":{"type":"string"},"status":{"type":"string"}},"type":"object"},"advisory.CommVaultResolution":{"description":"advisory.CommVaultResolution","properties":{"description":{"type":"string"},"resolution_details":{"items":{"$ref":"#/components/schemas/advisory.CommVaultResolutionDetails"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CommVaultResolutionDetails":{"description":"advisory.CommVaultResolutionDetails","properties":{"feature_release":{"type":"string"},"maintenance_release":{"type":"string"}},"type":"object"},"advisory.CompassSecurity":{"description":"advisory.CompassSecurity","properties":{"csnc_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"effect":{"type":"string"},"introduction":{"type":"string"},"product":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"risk":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.ContainerOS":{"description":"advisory.ContainerOS","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updates":{"items":{"$ref":"#/components/schemas/advisory.COSUpdate"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.CoreImpactExploit":{"description":"advisory.CoreImpactExploit","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"exploit_type":{"type":"string"},"platform":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.Correction":{"description":"advisory.Correction","properties":{"correctedAt":{"type":"string"},"orelease":{"type":"string"},"release":{"type":"string"}},"type":"object"},"advisory.Credit":{"description":"advisory.Credit","properties":{"lang":{"type":"string"},"type":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.Crestron":{"description":"advisory.Crestron","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"threat":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.CrowdSec":{"description":"advisory.CrowdSec","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"eitw":{"type":"boolean"},"first_seen":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Curl":{"description":"advisory.Curl","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"info":{"$ref":"#/components/schemas/advisory.OCurl"},"url":{"type":"string"}},"type":"object"},"advisory.CurlAffected":{"description":"advisory.CurlAffected","properties":{"ranges":{"items":{"$ref":"#/components/schemas/advisory.CurlRange"},"type":"array","uniqueItems":false},"versions":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CurlCWE":{"description":"advisory.CurlCWE","properties":{"desc":{"type":"string"},"id":{"type":"string"}},"type":"object"},"advisory.CurlCredit":{"description":"advisory.CurlCredit","properties":{"name":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.CurlRange":{"description":"advisory.CurlRange","properties":{"events":{"items":{"additionalProperties":{"type":"string"},"type":"object"},"type":"array","uniqueItems":false},"repo":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.CustomCPE":{"description":"advisory.CustomCPE","properties":{"mcpeapplicability":{"$ref":"#/components/schemas/advisory.MCPEApplicability"},"stringValue":{"type":"string"}},"type":"object"},"advisory.Cvrf":{"description":"advisory.Cvrf","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CvsssV2_3":{"description":"advisory.CvsssV2_3","properties":{"basescore":{"type":"string"},"temporalscore":{"type":"string"}},"type":"object"},"advisory.Cwe":{"description":"advisory.Cwe","properties":{"id":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.CweAcceptanceLevel":{"description":"advisory.CweAcceptanceLevel","properties":{"description":{"type":"string"},"lastModified":{"type":"string"}},"type":"object"},"advisory.CweData":{"description":"advisory.CweData","properties":{"lang":{"type":"string"},"name":{"type":"string"},"url":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.Cwes":{"description":"advisory.Cwes","properties":{"nodes":{"items":{"$ref":"#/components/schemas/advisory.CWENode"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.Cycle":{"description":"advisory.Cycle","properties":{"codename":{"type":"string"},"cycle":{"type":"string"},"discontinued":{},"eol":{},"extendedSupport":{},"latest":{"type":"string"},"latestReleaseDate":{"type":"string"},"link":{"type":"string"},"lts":{},"releaseDate":{"type":"string"},"releaseLabel":{"type":"string"},"support":{}},"type":"object"},"advisory.DBSpecific":{"description":"advisory.DBSpecific","properties":{"CWE":{"$ref":"#/components/schemas/advisory.CurlCWE"},"award":{"$ref":"#/components/schemas/advisory.Award"},"last_affected":{"type":"string"},"package":{"type":"string"},"severity":{"type":"string"},"url":{"type":"string"},"www":{"type":"string"}},"type":"object"},"advisory.DFNCert":{"description":"advisory.DFNCert","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary_de":{"type":"string"},"title_de":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DLink":{"description":"advisory.DLink","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DNN":{"description":"advisory.DNN","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Dahua":{"description":"advisory.Dahua","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DanFossCVEDetails":{"description":"advisory.DanFossCVEDetails","properties":{"base_score":{"type":"string"},"cve":{"type":"string"},"severity":{"type":"string"}},"type":"object"},"advisory.Danfoss":{"description":"advisory.Danfoss","properties":{"affected_products":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve_details":{"items":{"$ref":"#/components/schemas/advisory.DanFossCVEDetails"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Dassault":{"description":"advisory.Dassault","properties":{"affected_products":{"type":"string"},"affected_versions":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DateTime":{"description":"advisory.DateTime","type":"object"},"advisory.DebianCVE":{"description":"advisory.DebianCVE","properties":{"cve":{"type":"string"},"debianbug":{"type":"integer"},"description":{"type":"string"},"releases":{"items":{"$ref":"#/components/schemas/advisory.AffectedDebianRelease"},"type":"array","uniqueItems":false},"scope":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DebianSecurityAdvisory":{"description":"advisory.DebianSecurityAdvisory","properties":{"affected_packages":{"items":{"$ref":"#/components/schemas/advisory.AffectedDebianPackage"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"dsa":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Dell":{"description":"advisory.Dell","properties":{"articleNumber":{"type":"string"},"combinedProductList":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"dell_cves":{"items":{"$ref":"#/components/schemas/advisory.DellCVE"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DellCVE":{"description":"advisory.DellCVE","properties":{"cve":{"type":"string"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"}},"type":"object"},"advisory.DeltaAdvisory":{"description":"advisory.DeltaAdvisory","properties":{"affectedProducts":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"link":{"type":"string"},"recommendedAction":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.DistroPackage":{"description":"advisory.DistroPackage","properties":{"binary":{"type":"boolean"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"license":{"items":{"type":"string"},"type":"array","uniqueItems":false},"name":{"type":"string"},"secFixes":{"items":{"$ref":"#/components/schemas/advisory.SecFix"},"type":"array"},"versions":{"items":{"$ref":"#/components/schemas/advisory.DistroVersion"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.DistroVersion":{"description":"advisory.DistroVersion","properties":{"arch":{"type":"string"},"published_date":{"type":"string"},"release":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Django":{"description":"advisory.Django","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DocumentMetadata":{"description":"Document contains metadata about the CSAF document itself.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#321-document-property","properties":{"category":{"type":"string"},"csaf_version":{"type":"string"},"distribution":{"$ref":"#/components/schemas/advisory.CSAFDistribution"},"lang":{"type":"string"},"notes":{"description":"used by ncsc","items":{"$ref":"#/components/schemas/advisory.CSAFNote"},"type":"array","uniqueItems":false},"publisher":{"$ref":"#/components/schemas/advisory.Publisher"},"references":{"items":{"$ref":"#/components/schemas/advisory.CSAFReference"},"type":"array","uniqueItems":false},"title":{"description":"Aggregate severity is a vehicle that is provided by the document producer to convey the urgency and\ncriticality with which the one or more vulnerabilities reported should be addressed.","type":"string"},"tracking":{"$ref":"#/components/schemas/advisory.Tracking"}},"type":"object"},"advisory.DocumentPublisher":{"description":"advisory.DocumentPublisher","properties":{"contact_details":{"type":"string"},"issuing_authority":{"type":"string"},"type":{"description":"the json for this is missing/broke","type":"integer"}},"type":"object"},"advisory.DotCMS":{"description":"advisory.DotCMS","properties":{"credit":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"fixed_version":{"type":"string"},"issue_id":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DragosAdvisory":{"description":"advisory.DragosAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"link":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.Draytek":{"description":"advisory.Draytek","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Drupal":{"description":"advisory.Drupal","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"project":{"type":"string"},"risk":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EOLAlibaba":{"description":"advisory.EOLAlibaba","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"eol_date":{"type":"string"},"eol_name":{"type":"string"},"product":{"type":"string"},"release_date":{"type":"string"},"url":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.EOLMicrosoft":{"description":"advisory.EOLMicrosoft","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"edition":{"type":"string"},"extended_end_date":{"type":"string"},"mainstream_date":{"type":"string"},"product":{"type":"string"},"release":{"type":"string"},"release_end_date":{"type":"string"},"release_start_date":{"type":"string"},"retirement_date":{"type":"string"},"start_date":{"type":"string"},"support_policy":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EOLReleaseData":{"description":"advisory.EOLReleaseData","properties":{"already_eol":{"type":"boolean"},"branch":{"description":"Alpine Linux","type":"string"},"branch_url":{"description":"Alpine Linux","type":"string"},"codename":{"type":"string"},"cpe":{"type":"string"},"eol_date":{"type":"string"},"eol_date_extended_support":{"description":"Oracle Linux, Solaris","type":"string"},"eol_date_premier_support":{"description":"Oracle Linux, Solaris","type":"string"},"eol_elts_date":{"type":"string"},"eol_lts_date":{"type":"string"},"git_branch":{"description":"Alpine Linux","type":"string"},"git_branch_url":{"description":"Alpine Linux","type":"string"},"lts":{"description":"Ubuntu","type":"boolean"},"minor_releases":{"description":"Alpine Linux","items":{"type":"string"},"type":"array","uniqueItems":false},"product":{"type":"string"},"release_date":{"type":"string"},"release_name":{"type":"string"},"source_url":{"type":"string"},"technology_level":{"description":"AIX","type":"string"},"vendor":{"type":"string"},"version":{"type":"string"},"version_api":{"description":"Android","type":"string"},"version_darwin":{"description":"macOS","type":"string"},"version_sunos":{"description":"Solaris","type":"string"},"windows_current_build":{"description":"Microsoft Windows","type":"string"},"windows_display_version":{"description":"Microsoft Windows","type":"string"},"windows_edition_id":{"description":"Microsoft Windows","type":"string"},"windows_insider_preview":{"description":"Microsoft Windows","type":"boolean"}},"type":"object"},"advisory.EUVD":{"description":"advisory.EUVD","properties":{"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"assigner":{"type":"string"},"base_score":{"type":"number"},"base_score_vector":{"type":"string"},"base_score_version":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_updated":{"type":"string"},"description":{"type":"string"},"enisa_id_product":{"items":{"$ref":"#/components/schemas/advisory.EnisaIDProduct"},"type":"array","uniqueItems":false},"enisa_id_vendor":{"items":{"$ref":"#/components/schemas/advisory.EnisaIDVendor"},"type":"array","uniqueItems":false},"epss":{"type":"number"},"exploited":{"description":"This field is exploited field from endpoint /api/vulnerabilities.\napidocs : https://euvd.enisa.europa.eu/apidoc\nNote: There are records where exploited_since is populated with a valid date,\nbut it still shows up under non_exploitable data set","type":"boolean"},"exploited_since":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.EatonAdvisory":{"description":"advisory.EatonAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"eaton_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EcoSystem":{"description":"advisory.EcoSystem","properties":{"severity":{"type":"string"},"spl":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.Elastic":{"description":"advisory.Elastic","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"esaid":{"type":"string"},"remediation":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.Elspec":{"description":"advisory.Elspec","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EmergingThreatsSnort":{"description":"advisory.EmergingThreatsSnort","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"rev":{"type":"string"},"rule_disabled":{"type":"boolean"},"rule_name":{"type":"string"},"sid":{"type":"integer"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EmersonAdvisory":{"description":"advisory.EmersonAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"emerson_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EndOfLife":{"description":"advisory.EndOfLife","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cycles":{"items":{"$ref":"#/components/schemas/advisory.Cycle"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"name":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Endress":{"description":"advisory.Endress","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"impact":{"type":"string"},"mitigation":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EnisaIDProduct":{"description":"advisory.EnisaIDProduct","properties":{"id":{"type":"string"},"product_name":{"type":"string"},"product_version":{"type":"string"}},"type":"object"},"advisory.EnisaIDVendor":{"description":"advisory.EnisaIDVendor","properties":{"id":{"type":"string"},"vendor_name":{"type":"string"}},"type":"object"},"advisory.Event":{"description":"advisory.Event","properties":{"fixed":{"type":"string"},"introduced":{"type":"string"},"last_affected":{"type":"string"},"limit":{"type":"string"}},"type":"object"},"advisory.ExodusIntel":{"description":"advisory.ExodusIntel","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"disclosed_public":{"type":"string"},"disclosed_vendor":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ExploitDBExploitv2":{"description":"advisory.ExploitDBExploitv2","properties":{"author":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"edb_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ExternalReferences":{"description":"advisory.ExternalReferences","properties":{"description":{"type":"string"},"external_id":{"type":"string"},"source_name":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.F5":{"description":"advisory.F5","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FSecure":{"description":"advisory.FSecure","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Fanuc":{"description":"advisory.Fanuc","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Fastly":{"description":"advisory.Fastly","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Festo":{"description":"advisory.Festo","properties":{"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FileCloud":{"description":"advisory.FileCloud","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FileZilla":{"description":"advisory.FileZilla","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FixAff":{"description":"advisory.FixAff","properties":{"affected_since":{"type":"string"},"fixed_version":{"type":"string"},"patch_url":{"type":"string"}},"type":"object"},"advisory.Flag":{"description":"advisory.Flag","properties":{"date":{"type":"string"},"group_ids":{"items":{"type":"string"},"type":"array","uniqueItems":false},"label":{"type":"string"},"product_ids":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.FlattSecurity":{"description":"advisory.FlattSecurity","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ForgeRock":{"description":"advisory.ForgeRock","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FortinetAdvisory":{"description":"advisory.FortinetAdvisory","properties":{"acknowledgement":{"type":"string"},"affectedProducts":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvssv3":{"type":"string"},"date_added":{"type":"string"},"irnumber":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"solutions":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.FortinetIPS":{"description":"advisory.FortinetIPS","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"epss":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Foxit":{"description":"advisory.Foxit","properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.FoxitAffected"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FoxitAffected":{"description":"advisory.FoxitAffected","properties":{"product":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Fresenius":{"description":"advisory.Fresenius","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GCP":{"description":"advisory.GCP","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GEGas":{"description":"advisory.GEGas","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GEHealthcareAdvisory":{"description":"advisory.GEHealthcareAdvisory","properties":{"base_score":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_updated":{"type":"string"},"description":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GHAdvisoryJSONLean":{"description":"advisory.GHAdvisoryJSONLean","properties":{"classification":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"$ref":"#/components/schemas/advisory.GHCvss"},"cwes":{"$ref":"#/components/schemas/advisory.Cwes"},"databaseId":{"type":"integer"},"date_added":{"type":"string"},"description":{"type":"string"},"ghsaId":{"type":"string"},"id":{"type":"string"},"identifiers":{"items":{"$ref":"#/components/schemas/advisory.GHIdentifier"},"type":"array","uniqueItems":false},"notificationsPermalink":{"type":"string"},"origin":{"type":"string"},"permalink":{"type":"string"},"publishedAt":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.GHReference"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"summary":{"type":"string"},"updated_at":{"type":"string"},"vulnerabilities":{"$ref":"#/components/schemas/advisory.GHVulnerabilities"},"withdrawnAt":{"type":"string"}},"type":"object"},"advisory.GHCvss":{"description":"advisory.GHCvss","properties":{"score":{"type":"number"},"vectorString":{"type":"string"}},"type":"object"},"advisory.GHIdentifier":{"description":"advisory.GHIdentifier","properties":{"type":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.GHNode":{"description":"advisory.GHNode","properties":{"package":{"$ref":"#/components/schemas/advisory.GHPackage"},"severity":{"type":"string"},"updatedAt":{"type":"string"},"vulnerableVersionRange":{"type":"string"}},"type":"object"},"advisory.GHPackage":{"description":"advisory.GHPackage","properties":{"ecosystem":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.GHReference":{"description":"advisory.GHReference","properties":{"url":{"type":"string"}},"type":"object"},"advisory.GHSA":{"description":"advisory.GHSA","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"ghsa":{"$ref":"#/components/schemas/advisory.OriginalGHSA"},"url":{"type":"string"}},"type":"object"},"advisory.GHSAAffected":{"description":"advisory.GHSAAffected","properties":{"ecosystem_specific":{"$ref":"#/components/schemas/advisory.GHSAEcoSystemSpecific"},"package":{"$ref":"#/components/schemas/advisory.GHSAPackage"},"ranges":{"items":{"$ref":"#/components/schemas/advisory.GHSARange"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.GHSADatabaseSpecific":{"description":"advisory.GHSADatabaseSpecific","properties":{"cwe_ids":{"items":{"type":"string"},"type":"array","uniqueItems":false},"github_reviewed":{"type":"boolean"},"github_reviewed_at":{"type":"string"},"nvd_published_at":{"type":"string"},"severity":{"type":"string"}},"type":"object"},"advisory.GHSAEcoSystemSpecific":{"description":"advisory.GHSAEcoSystemSpecific","properties":{"affected_functions":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.GHSAEvent":{"description":"advisory.GHSAEvent","properties":{"fixed":{"type":"string"},"introduced":{"type":"string"}},"type":"object"},"advisory.GHSAPackage":{"description":"advisory.GHSAPackage","properties":{"ecosystem":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.GHSARange":{"description":"advisory.GHSARange","properties":{"events":{"items":{"$ref":"#/components/schemas/advisory.GHSAEvent"},"type":"array","uniqueItems":false},"type":{"type":"string"}},"type":"object"},"advisory.GHSAReference":{"description":"advisory.GHSAReference","properties":{"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GHSASeverity":{"description":"advisory.GHSASeverity","properties":{"score":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.GHVulnerabilities":{"description":"advisory.GHVulnerabilities","properties":{"nodes":{"items":{"$ref":"#/components/schemas/advisory.GHNode"},"type":"array","uniqueItems":false},"totalCount":{"type":"integer"}},"type":"object"},"advisory.GMOCyberSecurity":{"description":"advisory.GMOCyberSecurity","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary_ja":{"type":"string"},"title_ja":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Gallagher":{"description":"advisory.Gallagher","properties":{"activeExploitation":{"type":"boolean"},"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"fixes":{"type":"string"},"reportedBy":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Gen":{"description":"advisory.Gen","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"id":{"description":"not all of them have this","type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GenericEOL":{"description":"advisory.GenericEOL","properties":{"core":{"$ref":"#/components/schemas/advisory.GenericEOLCore"},"product":{"$ref":"#/components/schemas/advisory.GenericEOLProduct"},"vcInfo":{"$ref":"#/components/schemas/advisory.GenericEOLVCInfo"}},"type":"object"},"advisory.GenericEOLCore":{"description":"advisory.GenericEOLCore","properties":{"end_of_life":{"type":"string"},"end_of_sales":{"type":"string"},"end_of_security_support":{"type":"string"},"last_updated":{"type":"string"}},"type":"object"},"advisory.GenericEOLProduct":{"description":"advisory.GenericEOLProduct","properties":{"product_name":{"type":"string"},"product_version":{"type":"string"},"vendor_name":{"type":"string"}},"type":"object"},"advisory.GenericEOLReference":{"description":"advisory.GenericEOLReference","properties":{"description":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GenericEOLVCInfo":{"description":"advisory.GenericEOLVCInfo","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.GenericEOLReference"},"type":"array","uniqueItems":false},"replacement":{"$ref":"#/components/schemas/advisory.GenericEOLProduct"},"updated_at":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Genetec":{"description":"advisory.Genetec","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Gigabyte":{"description":"advisory.Gigabyte","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"link":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.GitHubExploit":{"description":"advisory.GitHubExploit","properties":{"clone_https_url":{"type":"string"},"clone_ssh_url":{"type":"string"},"clone_ssh_url_cached":{"type":"string"},"currently_trending":{"type":"boolean"},"cve":{"type":"string"},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"exploit_type":{"type":"string"},"forks":{"type":"integer"},"html_url":{"type":"string"},"id":{"type":"string"},"language":{"type":"string"},"reference_url":{"type":"string"},"refsource":{"type":"string"},"repo_full_path":{"type":"string"},"repo_id":{"type":"string"},"repo_name":{"type":"string"},"repo_owner":{"type":"string"},"stars":{"type":"integer"}},"type":"object"},"advisory.GitLabExploit":{"description":"advisory.GitLabExploit","properties":{"clone_https_url":{"type":"string"},"clone_ssh_url":{"type":"string"},"clone_ssh_url_cached":{"type":"string"},"cve":{"type":"string"},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"exploit_type":{"type":"string"},"forks":{"type":"integer"},"html_url":{"type":"string"},"language":{"type":"string"},"reference_url":{"type":"string"},"refsource":{"type":"string"},"repo_full_path":{"type":"string"},"repo_id":{"type":"string"},"repo_name":{"type":"string"},"repo_owner":{"type":"string"},"stars":{"type":"integer"}},"type":"object"},"advisory.GiteeExploit":{"description":"advisory.GiteeExploit","properties":{"clone_https_url":{"type":"string"},"clone_ssh_url":{"type":"string"},"clone_ssh_url_cached":{"type":"string"},"cve":{"type":"string"},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"exploit_type":{"type":"string"},"forks":{"type":"integer"},"html_url":{"type":"string"},"language":{"type":"string"},"reference_url":{"type":"string"},"refsource":{"type":"string"},"repo_full_path":{"type":"string"},"repo_id":{"type":"string"},"repo_name":{"type":"string"},"repo_owner":{"type":"string"},"stars":{"type":"integer"}},"type":"object"},"advisory.GitlabAdvisory":{"description":"advisory.GitlabAdvisory","properties":{"affected_range":{"type":"string"},"affected_versions":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_v2":{"type":"string"},"cvss_v3":{"type":"string"},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"filename":{"type":"string"},"fixed_versions":{"items":{"type":"string"},"type":"array","uniqueItems":false},"ghsa":{"items":{"type":"string"},"type":"array","uniqueItems":false},"gitlab_url":{"type":"string"},"identifier":{"type":"string"},"identifiers":{"items":{"type":"string"},"type":"array","uniqueItems":false},"not_impacted":{"type":"string"},"package_manager":{"type":"string"},"package_name":{"type":"string"},"package_slug":{"type":"string"},"pubdate":{"type":"string"},"solution":{"type":"string"},"title":{"type":"string"},"urls":{"items":{"type":"string"},"type":"array","uniqueItems":false},"uuid":{"type":"string"}},"type":"object"},"advisory.Glibc":{"description":"advisory.Glibc","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GnuTLS":{"description":"advisory.GnuTLS","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GoCredits":{"description":"advisory.GoCredits","properties":{"name":{"type":"string"}},"type":"object"},"advisory.GoEvent":{"description":"advisory.GoEvent","properties":{"fixed":{"type":"string"},"introduced":{"type":"string"}},"type":"object"},"advisory.GoVulnAffected":{"description":"advisory.GoVulnAffected","properties":{"database_specific":{"$ref":"#/components/schemas/advisory.GoVulnDatabaseSpecific"},"ecosystem_specific":{"$ref":"#/components/schemas/advisory.GoVulnEcosystemSpecific"},"package":{"$ref":"#/components/schemas/advisory.GoVulnPackage"},"ranges":{"items":{"$ref":"#/components/schemas/advisory.GoVulnRanges"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.GoVulnDatabaseSpecific":{"description":"advisory.GoVulnDatabaseSpecific","properties":{"url":{"type":"string"}},"type":"object"},"advisory.GoVulnEcosystemSpecific":{"description":"advisory.GoVulnEcosystemSpecific","properties":{"imports":{"items":{"$ref":"#/components/schemas/advisory.GoVulnImport"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.GoVulnImport":{"description":"advisory.GoVulnImport","properties":{"path":{"type":"string"},"symbols":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.GoVulnJSON":{"description":"advisory.GoVulnJSON","properties":{"advisory_url":{"type":"string"},"affected":{"items":{"$ref":"#/components/schemas/advisory.GoVulnAffected"},"type":"array","uniqueItems":false},"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"credits":{"items":{"$ref":"#/components/schemas/advisory.GoCredits"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"type":"string"},"ghsa":{"items":{"type":"string"},"type":"array","uniqueItems":false},"go_advisory_id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.GoVulnReference"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.GoVulnPackage":{"description":"advisory.GoVulnPackage","properties":{"ecosystem":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.GoVulnRanges":{"description":"advisory.GoVulnRanges","properties":{"events":{"items":{"$ref":"#/components/schemas/advisory.GoEvent"},"type":"array","uniqueItems":false},"type":{"type":"string"}},"type":"object"},"advisory.GoVulnReference":{"description":"advisory.GoVulnReference","properties":{"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Grafana":{"description":"advisory.Grafana","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GreyNoiseDetection":{"description":"advisory.GreyNoiseDetection","properties":{"category":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"intention":{"type":"string"},"label":{"type":"string"},"name":{"type":"string"},"recommend_block":{"type":"boolean"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"related_tags":{"items":{"$ref":"#/components/schemas/advisory.GreyNoiseTags"},"type":"array","uniqueItems":false},"slug":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GreyNoiseTags":{"description":"advisory.GreyNoiseTags","properties":{"category":{"type":"string"},"id":{"type":"string"},"intention":{"type":"string"},"name":{"type":"string"},"slug":{"type":"string"}},"type":"object"},"advisory.HCL":{"description":"advisory.HCL","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HIKVision":{"description":"advisory.HIKVision","properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"link":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.HKCert":{"description":"advisory.HKCert","properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"impact":{"type":"string"},"link":{"type":"string"},"relatedLinks":{"items":{"type":"string"},"type":"array"},"risk":{"type":"string"},"solutions":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.HMS":{"description":"advisory.HMS","properties":{"affected_products":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"impact":{"type":"string"},"mitigation":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HP":{"description":"advisory.HP","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"link":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.HPE":{"description":"advisory.HPE","properties":{"csaf":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Hacktivity":{"description":"advisory.Hacktivity","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"float64":{"type":"number"},"rank":{"type":"integer"},"reports_submitted":{"type":"integer"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HardwareUpdate":{"description":"advisory.HardwareUpdate","properties":{"affectedVersions":{"type":"string"},"cves":{"items":{"type":"string"},"type":"array"},"hardwarePlatform":{"type":"string"},"system":{"type":"string"},"updatedVersion":{"type":"string"}},"type":"object"},"advisory.HarmonyOS":{"description":"advisory.HarmonyOS","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HashiCorp":{"description":"advisory.HashiCorp","properties":{"affected_products":{"type":"string"},"background":{"type":"string"},"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"type":"string"},"remediation":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HaskellAffected":{"description":"advisory.HaskellAffected","properties":{"affected_constraint":{"type":"string"},"affected_versions":{"items":{"$ref":"#/components/schemas/advisory.HaskellVersion"},"type":"array","uniqueItems":false},"arch":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"os":{"items":{"type":"string"},"type":"array","uniqueItems":false},"package":{"type":"string"}},"type":"object"},"advisory.HaskellSADBAdvisory":{"description":"advisory.HaskellSADBAdvisory","properties":{"advisory_id":{"type":"string"},"affected_packages":{"items":{"$ref":"#/components/schemas/advisory.HaskellAffected"},"type":"array","uniqueItems":false},"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwes":{"items":{"type":"integer"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"keywords":{"items":{"type":"string"},"type":"array","uniqueItems":false},"references":{"additionalProperties":{"items":{"type":"string"},"type":"array"},"type":"object"},"related_vulns":{"items":{"type":"string"},"type":"array","uniqueItems":false},"updated_at":{"type":"string"}},"type":"object"},"advisory.HaskellVersion":{"description":"advisory.HaskellVersion","properties":{"fixed":{"type":"string"},"introduced":{"type":"string"}},"type":"object"},"advisory.HillromAdvisory":{"description":"advisory.HillromAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Hitachi":{"description":"advisory.Hitachi","properties":{"affectedProducts":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixedProducts":{"type":"string"},"hitachiId":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HitachiEnergy":{"description":"advisory.HitachiEnergy","properties":{"advisory_id":{"type":"string"},"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"exploited":{"type":"boolean"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Honeywell":{"description":"advisory.Honeywell","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Huawei":{"description":"advisory.Huawei","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"sa_number":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HuaweiEulerOS":{"description":"advisory.HuaweiEulerOS","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"integer"},"packages":{"type":"string"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"synopsis":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HuaweiIPS":{"description":"advisory.HuaweiIPS","properties":{"cnnvd":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_updated":{"type":"string"},"name":{"type":"string"},"severity":{"type":"string"},"threat_id":{"type":"integer"},"url":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.IAVA":{"description":"advisory.IAVA","properties":{"IAVA":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.IBM":{"description":"advisory.IBM","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ITW":{"description":"advisory.ITW","properties":{"cve":{"type":"string"},"date_added":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.ITWExploit":{"description":"advisory.ITWExploit","properties":{"advisory":{"type":"string"},"affected_versions":{"type":"string"},"analysis_url":{"type":"string"},"bug_introducing_change_list_url":{"type":"string"},"claimed_attribution":{"type":"string"},"claimed_attribution_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_discovered":{"type":"string"},"date_patched":{"type":"string"},"description":{"type":"string"},"first_patched_version":{"type":"string"},"patch_change_list_url":{"type":"string"},"product":{"type":"string"},"reported_by":{"type":"string"},"root_cause_analysis_url":{"type":"string"},"vendor":{"type":"string"},"vulnerability_type":{"type":"string"}},"type":"object"},"advisory.IVal":{"description":"advisory.IVal","properties":{"Value":{"type":"string"}},"type":"object"},"advisory.Idemia":{"description":"advisory.Idemia","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"sbid":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.IdentificationHelper":{"additionalProperties":{},"description":"advisory.IdentificationHelper","type":"object"},"advisory.Igel":{"description":"advisory.Igel","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Impact":{"description":"advisory.Impact","properties":{"capecId":{"type":"string"},"descriptions":{"items":{"$ref":"#/components/schemas/advisory.MDescriptions"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.IncibeAdvisory":{"description":"advisory.IncibeAdvisory","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"detail":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"solution":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.Intel":{"description":"advisory.Intel","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"link":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.IpIntelRecord":{"description":"advisory.IpIntelRecord","properties":{"asn":{"type":"string"},"city":{"type":"string"},"country":{"type":"string"},"country_code":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"feed_ids":{"items":{"type":"string"},"type":"array","uniqueItems":false},"hostnames":{"items":{"type":"string"},"type":"array","uniqueItems":false},"ip":{"type":"string"},"lastSeen":{"type":"string"},"matches":{"items":{"type":"string"},"type":"array","uniqueItems":false},"port":{"type":"integer"},"ssl":{"type":"boolean"},"type":{"$ref":"#/components/schemas/advisory.RecordType"}},"type":"object"},"advisory.IsraeliAlert":{"description":"advisory.IsraeliAlert","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details_he":{"type":"string"},"handling_he":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary_he":{"type":"string"},"title_he":{"type":"string"}},"type":"object"},"advisory.IsraeliVulnerability":{"description":"advisory.IsraeliVulnerability","properties":{"ILVNId":{"type":"string"},"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"solution":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Issued":{"description":"advisory.Issued","type":"object"},"advisory.Istio":{"description":"advisory.Istio","properties":{"affected_version":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Ivanti":{"description":"advisory.Ivanti","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.IvantiRSS":{"description":"advisory.IvantiRSS","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.JFrog":{"description":"advisory.JFrog","properties":{"cpes":{"items":{"$ref":"#/components/schemas/advisory.NVD20CVECPEMatch"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"product":{"type":"string"},"severity":{"type":"string"},"summary":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"versions":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.JNJAdvisory":{"description":"advisory.JNJAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.JVN":{"description":"advisory.JVN","properties":{"affected_en":{"type":"string"},"affected_ja":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description_en":{"type":"string"},"description_ja":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"solution_en":{"type":"string"},"solution_ja":{"type":"string"},"summary_en":{"type":"string"},"summary_ja":{"type":"string"},"title_en":{"type":"string"},"title_ja":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.JVNAdvisoryItem":{"description":"advisory.JVNAdvisoryItem","properties":{"cpe":{"items":{"$ref":"#/components/schemas/advisory.JVNCPE"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"items":{"$ref":"#/components/schemas/advisory.CVSS"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"description_en":{"type":"string"},"identifier":{"type":"string"},"issued":{"type":"string"},"modified":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.JVNReference"},"type":"array","uniqueItems":false},"title":{"type":"string"},"title_en":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"url_en":{"type":"string"}},"type":"object"},"advisory.JVNCPE":{"description":"advisory.JVNCPE","properties":{"cpe":{"type":"string"},"product":{"type":"string"},"vendor":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.JVNReference":{"description":"advisory.JVNReference","properties":{"id":{"type":"string"},"source":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.Jenkins":{"description":"advisory.Jenkins","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fix":{"type":"string"},"link":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.JetBrains":{"description":"advisory.JetBrains","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"product":{"type":"string"},"resolved_in":{"items":{"type":"string"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.JohnsonControls":{"description":"advisory.JohnsonControls","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Juniper":{"description":"advisory.Juniper","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss3_score":{"type":"string"},"cvss3_vector":{"type":"string"},"cvss4_score":{"type":"string"},"cvss4_vector":{"type":"string"},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.K8S":{"description":"advisory.K8S","properties":{"content":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"issue_id":{"type":"integer"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.KEVCatalogVulnerability":{"description":"advisory.KEVCatalogVulnerability","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwes":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"dueDate":{"type":"string"},"knownRansomwareCampaignUse":{"type":"string"},"notes":{"type":"string"},"product":{"type":"string"},"requiredAction":{"type":"string"},"shortDescription":{"type":"string"},"vendorProject":{"type":"string"},"vulnerabilityName":{"type":"string"}},"type":"object"},"advisory.KRCertAdvisory":{"description":"advisory.KRCertAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description_ko":{"type":"string"},"link":{"type":"string"},"overview_ko":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title_ko":{"type":"string"}},"type":"object"},"advisory.KasperskyICSCERTAdvisory":{"description":"advisory.KasperskyICSCERTAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"klcert_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Kb":{"description":"advisory.Kb","properties":{"kb_url":{"type":"string"},"ms_date_added":{"type":"string"},"status":{"type":"string"},"supercedence":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.KbThreatDescription":{"description":"advisory.KbThreatDescription","properties":{"dos":{"type":"string"},"exploited":{"type":"string"},"latest_software_release":{"type":"string"},"level":{"items":{"type":"string"},"type":"array","uniqueItems":false},"older_software_release":{"type":"string"},"publicly_disclosed":{"type":"string"},"type":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.KoreLogic":{"description":"advisory.KoreLogic","properties":{"affected_product":{"type":"string"},"affected_vendor":{"type":"string"},"affected_version":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Kunbus":{"description":"advisory.Kunbus","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.LG":{"description":"advisory.LG","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Lantronix":{"description":"advisory.Lantronix","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Lenovo":{"description":"advisory.Lenovo","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"industry_identifiers":{"items":{"type":"string"},"type":"array","uniqueItems":false},"last_updated":{"type":"string"},"lenovo_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.LexmarkAdvisory":{"description":"advisory.LexmarkAdvisory","properties":{"affectedProducts":{"items":{"$ref":"#/components/schemas/advisory.AffectedProduct"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"type":"string"},"impact":{"type":"string"},"lastUpdate":{"type":"string"},"link":{"type":"string"},"publicReleaseDate":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"revision":{"type":"string"},"summary":{"type":"string"},"updated_at":{"type":"string"},"workarounds":{"type":"string"}},"type":"object"},"advisory.LibreOffice":{"description":"advisory.LibreOffice","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Linux":{"description":"advisory.Linux","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.LogSource":{"description":"advisory.LogSource","properties":{"category":{"type":"string"},"definition":{"type":"string"},"product":{"type":"string"},"service":{"type":"string"}},"type":"object"},"advisory.LolAdvs":{"description":"advisory.LolAdvs","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"lol_json":{"additionalProperties":{},"type":"object"},"mitre_id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MACert":{"description":"advisory.MACert","properties":{"affected_systems_fr":{"type":"string"},"assessment_fr":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"impact_fr":{"type":"string"},"reference":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"risk_fr":{"type":"string"},"risks_fr":{"type":"string"},"solution_fr":{"type":"string"},"title_fr":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MAffected":{"description":"advisory.MAffected","properties":{"collectionURL":{"type":"string"},"cpes":{"items":{"type":"string"},"type":"array","uniqueItems":false},"defaultStatus":{"type":"string"},"packageName":{"type":"string"},"packageURL":{"type":"string"},"platforms":{"items":{"type":"string"},"type":"array","uniqueItems":false},"product":{"type":"string"},"repo":{"type":"string"},"vendor":{"type":"string"},"versions":{"items":{"$ref":"#/components/schemas/advisory.MVersion"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.MBranch":{"description":"advisory.MBranch","properties":{"Branch":{"items":{"$ref":"#/components/schemas/advisory.MBranch"},"type":"array","uniqueItems":false},"FullProductName":{"items":{"$ref":"#/components/schemas/advisory.MFullProductName"},"type":"array","uniqueItems":false},"Items":{"items":{"$ref":"#/components/schemas/advisory.MItem"},"type":"array","uniqueItems":false},"name":{"type":"string"},"type":{"description":"diff","type":"integer"}},"type":"object"},"advisory.MCPEApplicability":{"description":"advisory.MCPEApplicability","properties":{"negate":{"type":"boolean"},"nodes":{"items":{"$ref":"#/components/schemas/advisory.MNodes"},"type":"array","uniqueItems":false},"operator":{"type":"string"}},"type":"object"},"advisory.MCPEMatch":{"description":"advisory.MCPEMatch","properties":{"criteria":{"type":"string"},"matchCriteriaId":{"type":"string"},"versionEndExcluding":{"type":"string"},"versionEndIncluding":{"type":"string"},"versionStartExcluding":{"type":"string"},"versionStartIncluding":{"type":"string"},"vulnerable":{"type":"boolean"}},"type":"object"},"advisory.MCna":{"description":"advisory.MCna","properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.MAffected"},"type":"array","uniqueItems":false},"cpeApplicability":{"items":{"$ref":"#/components/schemas/advisory.CustomCPE"},"type":"array","uniqueItems":false},"credits":{"items":{"$ref":"#/components/schemas/advisory.Credit"},"type":"array","uniqueItems":false},"descriptions":{"items":{"$ref":"#/components/schemas/advisory.MDescriptions"},"type":"array","uniqueItems":false},"impacts":{"items":{"$ref":"#/components/schemas/advisory.Impact"},"type":"array","uniqueItems":false},"metrics":{"items":{"$ref":"#/components/schemas/advisory.Metric"},"type":"array","uniqueItems":false},"problemTypes":{"items":{"$ref":"#/components/schemas/advisory.MProblemTypes"},"type":"array","uniqueItems":false},"providerMetadata":{"$ref":"#/components/schemas/advisory.MProviderMetadata"},"references":{"items":{"$ref":"#/components/schemas/advisory.MReference"},"type":"array","uniqueItems":false},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"timeline":{"items":{"$ref":"#/components/schemas/advisory.Timeline"},"type":"array","uniqueItems":false},"title":{"type":"string"}},"type":"object"},"advisory.MContainers":{"description":"advisory.MContainers","properties":{"adp":{"items":{"$ref":"#/components/schemas/advisory.ADPContainer"},"type":"array","uniqueItems":false},"cna":{"$ref":"#/components/schemas/advisory.MCna"}},"type":"object"},"advisory.MCveMetadata":{"description":"advisory.MCveMetadata","properties":{"assignerOrgId":{"type":"string"},"assignerShortName":{"type":"string"},"cveId":{"type":"string"},"datePublished":{"type":"string"},"dateReserved":{"type":"string"},"dateUpdated":{"type":"string"},"state":{"type":"string"}},"type":"object"},"advisory.MCvssV20":{"description":"advisory.MCvssV20","properties":{"accessVector":{"type":"string"},"attackComplexity":{"type":"string"},"authentication":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.MCvssV30":{"description":"advisory.MCvssV30","properties":{"attackComplexity":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"scope":{"type":"string"},"userInteraction":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.MCvssV31":{"description":"advisory.MCvssV31","properties":{"attackComplexity":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"scope":{"type":"string"},"userInteraction":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.MCvssV40":{"description":"advisory.MCvssV40","properties":{"attackComplexity":{"type":"string"},"attackRequirements":{"type":"string"},"attackVector":{"type":"string"},"automatable":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"privilegesRequired":{"type":"string"},"providerUrgency":{"type":"string"},"recovery":{"type":"string"},"safety":{"type":"string"},"subAvailabilityImpact":{"type":"string"},"subConfidentialityImpact":{"type":"string"},"subIntegrityImpact":{"type":"string"},"userInteraction":{"type":"string"},"valueDensity":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"},"vulnAvailabilityImpact":{"type":"string"},"vulnConfidentialityImpact":{"type":"string"},"vulnIntegrityImpact":{"type":"string"},"vulnerabilityResponseEffort":{"type":"string"}},"type":"object"},"advisory.MDescriptions":{"description":"advisory.MDescriptions","properties":{"lang":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.MDocumentTracking":{"description":"advisory.MDocumentTracking","properties":{"CurrentReleaseDate":{"type":"string"},"InitialReleaseDate":{"type":"string"},"identification":{"$ref":"#/components/schemas/advisory.MIdentification"},"revisionhistory":{"description":"diff in xml/json","items":{"$ref":"#/components/schemas/advisory.RRevision"},"type":"array","uniqueItems":false},"status":{"description":"again - change in json/xml","type":"integer"},"version":{"type":"string"}},"type":"object"},"advisory.MEProduct":{"description":"advisory.MEProduct","properties":{"ID":{"type":"string"},"display_value":{"type":"string"}},"type":"object"},"advisory.MFiles":{"description":"advisory.MFiles","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MFullProductName":{"description":"advisory.MFullProductName","properties":{"CPE":{"type":"string"},"ProductID":{"type":"string"},"Value":{"type":"string"}},"type":"object"},"advisory.MISPValueNoID":{"description":"advisory.MISPValueNoID","properties":{"description":{"type":"string"},"meta":{"$ref":"#/components/schemas/advisory.MispMeta"},"related":{"items":{"$ref":"#/components/schemas/advisory.MispRelatedItem"},"type":"array","uniqueItems":false},"value":{"type":"string"}},"type":"object"},"advisory.MITREAttackGroupNoID":{"description":"advisory.MITREAttackGroupNoID","properties":{"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"description":{"type":"string"},"name":{"type":"string"},"techniques":{"items":{"$ref":"#/components/schemas/advisory.MitreAttackTechnique"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.MIdentification":{"description":"advisory.MIdentification","properties":{"alias":{"$ref":"#/components/schemas/advisory.IVal"},"id":{"$ref":"#/components/schemas/advisory.IVal"}},"type":"object"},"advisory.MItem":{"description":"advisory.MItem","properties":{"Items":{"items":{"$ref":"#/components/schemas/advisory.MItem"},"type":"array","uniqueItems":false},"Name":{"type":"string"},"ProductID":{"type":"string"},"Type":{"description":"diff","type":"integer"},"Value":{"type":"string"}},"type":"object"},"advisory.MNodes":{"description":"advisory.MNodes","properties":{"cpeMatch":{"items":{"$ref":"#/components/schemas/advisory.MCPEMatch"},"type":"array","uniqueItems":false},"negate":{"type":"boolean"},"operator":{"type":"string"}},"type":"object"},"advisory.MProblemTypes":{"description":"advisory.MProblemTypes","properties":{"descriptions":{"items":{"$ref":"#/components/schemas/advisory.PTMDescriptions"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.MProductStatus":{"description":"advisory.MProductStatus","properties":{"ProductID":{"items":{"type":"string"},"type":"array","uniqueItems":false},"type":{"description":"diff","type":"integer"}},"type":"object"},"advisory.MProductTree":{"description":"advisory.MProductTree","properties":{"Branch":{"items":{"$ref":"#/components/schemas/advisory.MBranch"},"type":"array","uniqueItems":false},"FullProductName":{"items":{"$ref":"#/components/schemas/advisory.MFullProductName"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.MProviderMetadata":{"description":"OK","properties":{"dateUpdated":{"description":"FIXME: flip to time","type":"string"},"orgId":{"type":"string"},"shortName":{"type":"string"}},"type":"object"},"advisory.MReference":{"description":"advisory.MReference","properties":{"name":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.MRemediation":{"description":"advisory.MRemediation","properties":{"AffectedFiles":{"items":{"$ref":"#/components/schemas/advisory.AffectedFile"},"type":"array","uniqueItems":false},"Date":{"type":"string"},"DateSpecified":{"type":"boolean"},"Description":{"$ref":"#/components/schemas/advisory.IVal"},"FixedBuild":{"type":"string"},"ProductID":{"items":{"type":"string"},"type":"array","uniqueItems":false},"RestartRequired":{"$ref":"#/components/schemas/advisory.IVal"},"SubType":{"type":"string"},"Type":{"description":"diff","type":"integer"},"Url":{"type":"string"},"supercedence":{"type":"string"}},"type":"object"},"advisory.MSCVRF":{"description":"advisory.MSCVRF","properties":{"DocumentTitle":{"$ref":"#/components/schemas/advisory.MSDocumentTitle"},"DocumentTracking":{"$ref":"#/components/schemas/advisory.MDocumentTracking"},"ProductTree":{"$ref":"#/components/schemas/advisory.MProductTree"},"document_type":{"type":"string"},"documentnotes":{"description":"diff","items":{"$ref":"#/components/schemas/advisory.RNote"},"type":"array","uniqueItems":false},"documentpublisher":{"$ref":"#/components/schemas/advisory.DocumentPublisher"},"vulnerability":{"items":{"$ref":"#/components/schemas/advisory.MVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.MSDocumentTitle":{"description":"advisory.MSDocumentTitle","properties":{"Value":{"type":"string"}},"type":"object"},"advisory.MVersion":{"description":"advisory.MVersion","properties":{"lessThan":{"type":"string"},"lessThanOrEqual":{"type":"string"},"status":{"type":"string"},"version":{"type":"string"},"versionType":{"type":"string"}},"type":"object"},"advisory.MVulnerability":{"description":"advisory.MVulnerability","properties":{"ProductStatuses":{"items":{"$ref":"#/components/schemas/advisory.MProductStatus"},"type":"array","uniqueItems":false},"Remediations":{"items":{"$ref":"#/components/schemas/advisory.MRemediation"},"type":"array","uniqueItems":false},"Threats":{"items":{"$ref":"#/components/schemas/advisory.RThreat"},"type":"array","uniqueItems":false},"acknowledgments":{"items":{"$ref":"#/components/schemas/advisory.Acknowledgement"},"type":"array","uniqueItems":false},"cve":{"type":"string"},"cvssscoresets":{"items":{"$ref":"#/components/schemas/advisory.RScoreSet"},"type":"array","uniqueItems":false},"notes":{"items":{"$ref":"#/components/schemas/advisory.Note"},"type":"array","uniqueItems":false},"ordinal":{"type":"string"},"revisionhistory":{"description":"diff in xml/json","items":{"$ref":"#/components/schemas/advisory.RRevision"},"type":"array","uniqueItems":false},"title":{"$ref":"#/components/schemas/advisory.IVal"}},"type":"object"},"advisory.MaliciousPackage":{"description":"advisory.MaliciousPackage","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"malware":{"$ref":"#/components/schemas/advisory.OSVObj"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MaliciousVSCodeExts":{"description":"advisory.MaliciousVSCodeExts","properties":{"date_added":{"type":"string"},"name":{"type":"string"},"publisher":{"type":"string"},"type":{"type":"string"},"updated_at":{"description":"the data in this feed comes from manual curation. so this will likely be omitted.","type":"string"},"url":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.ManageEngine":{"description":"advisory.ManageEngine","properties":{"ADVISORY":{"type":"string"},"Added_Time":{"type":"string"},"CVE_Details_Link":{"$ref":"#/components/schemas/advisory.CVEDetailsLink"},"CVE_ID":{"type":"string"},"CVSS_Severity_Rating":{"type":"string"},"Fixed":{"type":"string"},"For_product_search":{"type":"string"},"ID":{"type":"string"},"Product":{"$ref":"#/components/schemas/advisory.MEProduct"},"Product_list":{"items":{"$ref":"#/components/schemas/advisory.MEProduct"},"type":"array","uniqueItems":false},"Product_specific_details":{"items":{"$ref":"#/components/schemas/advisory.ProductSpecificDetail"},"type":"array","uniqueItems":false},"Summary":{"type":"string"},"Version":{"type":"string"},"index_field":{"type":"string"}},"type":"object"},"advisory.ManageEngineAdvisory":{"description":"advisory.ManageEngineAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"manage_engine":{"$ref":"#/components/schemas/advisory.ManageEngine"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MbedTLS":{"description":"advisory.MbedTLS","properties":{"affects":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.McAfee":{"description":"advisory.McAfee","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"mcafee_score":{"items":{"$ref":"#/components/schemas/advisory.McAfeeScore"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.McAfeeScore":{"description":"advisory.McAfeeScore","properties":{"base":{"type":"string"},"cve":{"type":"string"},"temporal":{"type":"string"},"vector":{"type":"string"}},"type":"object"},"advisory.Mediatek":{"description":"advisory.Mediatek","properties":{"affected_chipsets":{"items":{"type":"string"},"type":"array","uniqueItems":false},"affected_software":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MedtronicAdvisory":{"description":"advisory.MedtronicAdvisory","properties":{"affected_products":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Mendix":{"description":"advisory.Mendix","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"id":{"type":"string"},"mendix_id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MetaAdvisories":{"description":"advisory.MetaAdvisories","properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.MAffected"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MetaData":{"description":"advisory.MetaData","properties":{"advisory":{"$ref":"#/components/schemas/advisory.AdvisoryDetails"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"packages":{"items":{"$ref":"#/components/schemas/advisory.VulnCheckPackage"},"type":"array","uniqueItems":false},"references":{"items":{"$ref":"#/components/schemas/advisory.OvalReference"},"type":"array","uniqueItems":false},"title":{"type":"string"}},"type":"object"},"advisory.MetasploitExploit":{"description":"advisory.MetasploitExploit","properties":{"author":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Metric":{"description":"advisory.Metric","properties":{"cvssV2_0":{"$ref":"#/components/schemas/advisory.MCvssV20"},"cvssV3_0":{"$ref":"#/components/schemas/advisory.MCvssV30"},"cvssV3_1":{"$ref":"#/components/schemas/advisory.MCvssV31"},"cvssV4_0":{"$ref":"#/components/schemas/advisory.MCvssV40"},"format":{"type":"string"},"other":{"$ref":"#/components/schemas/advisory.MetricsOther"},"scenarios":{"items":{"$ref":"#/components/schemas/advisory.MetricScenario"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.MetricScenario":{"description":"advisory.MetricScenario","properties":{"lang":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.MetricsOther":{"description":"advisory.MetricsOther","properties":{"content":{"type":"object"},"type":{"type":"string"}},"type":"object"},"advisory.MicrosoftCSAF":{"description":"advisory.MicrosoftCSAF","properties":{"csaf":{"$ref":"#/components/schemas/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MicrosoftCVRF":{"description":"advisory.MicrosoftCVRF","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvrf":{"$ref":"#/components/schemas/advisory.MSCVRF"},"date_added":{"type":"string"},"exploited_list":{"items":{"$ref":"#/components/schemas/advisory.ITW"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MicrosoftDriverBlockList":{"description":"advisory.MicrosoftDriverBlockList","properties":{"date_added":{"type":"string"},"file_id":{"description":"From FileAttrib or Deny","type":"string"},"file_metadata":{"$ref":"#/components/schemas/advisory.MicrosoftFileMetadata"}},"type":"object"},"advisory.MicrosoftFileMetadata":{"description":"File-level metadata","properties":{"file_name":{"description":"Full path (FilePath + FileName or FriendlyName)","type":"string"},"maximum_file_version":{"type":"string"},"minimum_file_version":{"type":"string"},"product_name":{"type":"string"},"sha1_hash":{"type":"string"},"sha256_hash":{"type":"string"}},"type":"object"},"advisory.MicrosoftKb":{"description":"advisory.MicrosoftKb","properties":{"cve":{"type":"string"},"date_added":{"type":"string"},"kbs":{"items":{"$ref":"#/components/schemas/advisory.Kb"},"type":"array","uniqueItems":false},"threat":{"$ref":"#/components/schemas/advisory.KbThreatDescription"},"title":{"type":"string"}},"type":"object"},"advisory.Mikrotik":{"description":"advisory.Mikrotik","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Mindray":{"description":"advisory.Mindray","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MispMeta":{"description":"advisory.MispMeta","properties":{"attribution-confidence":{"type":"string"},"cfr-suspected-state-sponsor":{"type":"string"},"cfr-suspected-victims":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cfr-target-category":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cfr-type-of-incident":{"items":{"type":"string"},"type":"array","uniqueItems":false},"country":{"type":"string"},"refs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"synonyms":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.MispRelatedItem":{"description":"advisory.MispRelatedItem","properties":{"dest-uuid":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"type":{"type":"string"}},"type":"object"},"advisory.MispValue":{"description":"advisory.MispValue","properties":{"description":{"type":"string"},"meta":{"$ref":"#/components/schemas/advisory.MispMeta"},"related":{"items":{"$ref":"#/components/schemas/advisory.MispRelatedItem"},"type":"array","uniqueItems":false},"uuid":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.Mitel":{"description":"advisory.Mitel","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MitreAttackRef":{"description":"advisory.MitreAttackRef","properties":{"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MitreAttackTechWithRefs":{"description":"advisory.MitreAttackTechWithRefs","properties":{"domain":{"type":"string"},"id":{"type":"string"},"name":{"type":"string"},"nist_controls":{"items":{"$ref":"#/components/schemas/advisory.NISTControl"},"type":"array","uniqueItems":false},"references":{"items":{"$ref":"#/components/schemas/advisory.MitreAttackRef"},"type":"array","uniqueItems":false},"subtechnique":{"type":"boolean"},"tactics":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.MitreAttackTechnique":{"description":"advisory.MitreAttackTechnique","properties":{"sub_technique":{"type":"string"},"sub_technique_name":{"type":"string"},"tactic":{"items":{"type":"string"},"type":"array","uniqueItems":false},"technique_id":{"type":"string"},"technique_name":{"type":"string"}},"type":"object"},"advisory.MitreCVEListV5":{"description":"advisory.MitreCVEListV5","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"mitre_ref":{"$ref":"#/components/schemas/advisory.MitreCVEListV5Ref"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MitreCVEListV5Ref":{"description":"advisory.MitreCVEListV5Ref","properties":{"containers":{"$ref":"#/components/schemas/advisory.MContainers"},"cveMetadata":{"$ref":"#/components/schemas/advisory.MCveMetadata"},"dataType":{"type":"string"},"dataVersion":{"type":"string"}},"type":"object"},"advisory.MitreGroupCTI":{"description":"advisory.MitreGroupCTI","properties":{"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"description":{"type":"string"},"id":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.ExternalReferences"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.MitsubishiElectricAdvisory":{"description":"advisory.MitsubishiElectricAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_revised":{"description":"could nuke this at some pt in the future as it's a dupe","type":"string"},"mitsubishi_electric_id":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MongoDB":{"description":"advisory.MongoDB","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"score":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MoxaAdvisory":{"description":"advisory.MoxaAdvisory","properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MozillaAdvisory":{"description":"advisory.MozillaAdvisory","properties":{"affected_components":{"items":{"$ref":"#/components/schemas/advisory.MozillaComponent"},"type":"array","uniqueItems":false},"bugzilla":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"fixed_in":{"items":{"type":"string"},"type":"array","uniqueItems":false},"impact":{"type":"string"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"reporter":{"type":"string"},"risk":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MozillaComponent":{"description":"advisory.MozillaComponent","properties":{"bugzilla":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"description":{"type":"string"},"impact":{"type":"string"},"reporter":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.NCSC":{"description":"advisory.NCSC","properties":{"csaf":{"$ref":"#/components/schemas/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary_nl":{"type":"string"},"title_nl":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NCSCCVE":{"description":"advisory.NCSCCVE","properties":{"csaf":{"$ref":"#/components/schemas/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary_nl":{"type":"string"},"title_nl":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NEC":{"description":"advisory.NEC","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"nvd_id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NHS":{"description":"advisory.NHS","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"summary":{"type":"string"},"threat_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NI":{"description":"advisory.NI","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"ovewrview":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NISTControl":{"description":"advisory.NISTControl","properties":{"cis_controls":{"items":{"$ref":"#/components/schemas/advisory.CISControl"},"type":"array","uniqueItems":false},"nist_control_family":{"type":"string"},"nist_control_id":{"type":"string"},"nist_control_name":{"type":"string"}},"type":"object"},"advisory.NTP":{"description":"advisory.NTP","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NVD20CVECPEMatch":{"description":"advisory.NVD20CVECPEMatch","properties":{"criteria":{"type":"string"},"matchCriteriaId":{"type":"string"},"versionEndExcluding":{"type":"string"},"versionEndIncluding":{"type":"string"},"versionStartExcluding":{"type":"string"},"versionStartIncluding":{"type":"string"},"vulnerable":{"type":"boolean"}},"type":"object"},"advisory.NVD20Configuration":{"description":"advisory.NVD20Configuration","properties":{"negate":{"type":"boolean"},"nodes":{"items":{"$ref":"#/components/schemas/advisory.NVD20Node"},"type":"array","uniqueItems":false},"operator":{"type":"string"}},"type":"object"},"advisory.NVD20Node":{"description":"advisory.NVD20Node","properties":{"cpeMatch":{"items":{"$ref":"#/components/schemas/advisory.NVD20CVECPEMatch"},"type":"array","uniqueItems":false},"negate":{"type":"boolean"},"operator":{"type":"string"}},"type":"object"},"advisory.NVD20Source":{"description":"advisory.NVD20Source","properties":{"contactEmail":{"type":"string"},"created":{"type":"string"},"cweAcceptanceLevel":{"$ref":"#/components/schemas/advisory.CweAcceptanceLevel"},"lastModified":{"type":"string"},"name":{"type":"string"},"sourceIdentifiers":{"items":{"type":"string"},"type":"array","uniqueItems":false},"v3AcceptanceLevel":{"$ref":"#/components/schemas/advisory.V3AcceptanceLevel"}},"type":"object"},"advisory.NVDCPEDictionary":{"description":"advisory.NVDCPEDictionary","properties":{"backupOnly":{"type":"string"}},"type":"object"},"advisory.NZAdvisory":{"description":"advisory.NZAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"happening":{"type":"string"},"link":{"type":"string"},"lookFor":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"whatToDo":{"type":"string"}},"type":"object"},"advisory.Naver":{"description":"advisory.Naver","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Nessus":{"description":"advisory.Nessus","properties":{"cpe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"exploitability_ease":{"description":"seems like only 3 vals for this","type":"string"},"filename":{"type":"string"},"iava":{"items":{"type":"string"},"type":"array","uniqueItems":false},"name":{"type":"string"},"script_id":{"type":"integer"},"updated":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NetApp":{"description":"advisory.NetApp","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"impact":{"type":"string"},"ntap":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Netatalk":{"description":"advisory.Netatalk","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Netgate":{"description":"advisory.Netgate","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Netgear":{"description":"advisory.Netgear","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"psvn_number":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Netskope":{"description":"advisory.Netskope","properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Nexpose":{"description":"advisory.Nexpose","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"identifier":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NginxAdvisory":{"description":"advisory.NginxAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"not_vuln_versions":{"items":{"type":"string"},"type":"array","uniqueItems":false},"patch_pgp":{"type":"string"},"patch_url":{"type":"string"},"severity":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vuln_versions":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.NodeAuthor":{"description":"advisory.NodeAuthor","properties":{"author":{"type":"string"},"username":{"type":"string"},"website":{"type":"string"}},"type":"object"},"advisory.NodeJS":{"description":"advisory.NodeJS","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NodeSecurity":{"description":"advisory.NodeSecurity","properties":{"affected_environments":{"items":{"type":"string"},"type":"array","uniqueItems":false},"author":{"$ref":"#/components/schemas/advisory.NodeAuthor"},"coordinating_vendor":{"type":"string"},"created_at":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"number"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"id":{"type":"integer"},"module_name":{"type":"string"},"overview":{"type":"string"},"patched_versions":{"type":"string"},"publish_date":{"type":"string"},"recommendation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vulnerable_versions":{"type":"string"}},"type":"object"},"advisory.Nokia":{"description":"advisory.Nokia","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Note":{"description":"advisory.Note","properties":{"ordinal":{"type":"string"},"text":{"type":"string"},"title":{"type":"string"},"type":{"type":"integer"}},"type":"object"},"advisory.NotePadPlusPlus":{"description":"advisory.NotePadPlusPlus","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Nozomi":{"description":"advisory.Nozomi","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Nuclei":{"description":"advisory.Nuclei","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"template":{"type":"object"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NvidiaRevision":{"description":"advisory.NvidiaRevision","properties":{"date":{"type":"string"},"description":{"type":"string"},"revision":{"type":"string"}},"type":"object"},"advisory.OCurl":{"description":"advisory.OCurl","properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.CurlAffected"},"type":"array","uniqueItems":false},"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"credits":{"items":{"$ref":"#/components/schemas/advisory.CurlCredit"},"type":"array","uniqueItems":false},"database_specific":{"$ref":"#/components/schemas/advisory.DBSpecific"},"details":{"type":"string"},"id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"schema_version":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.OSV":{"description":"advisory.OSV","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_updated":{"type":"string"},"osv":{"$ref":"#/components/schemas/advisory.OSVObj"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OSVObj":{"description":"advisory.OSVObj","properties":{"affected":{"description":"collection based on https://ossf.github.io/osv-schema/","items":{"$ref":"#/components/schemas/advisory.Affected"},"type":"array","uniqueItems":false},"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"details":{"type":"string"},"id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.OSVReference"},"type":"array","uniqueItems":false},"related":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"withdrawn":{"type":"string"}},"type":"object"},"advisory.OSVPackage":{"description":"advisory.OSVPackage","properties":{"ecosystem":{"type":"string"},"name":{"type":"string"},"purl":{"type":"string"}},"type":"object"},"advisory.OSVReference":{"description":"advisory.OSVReference","properties":{"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OTRS":{"description":"advisory.OTRS","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"product":{"type":"string"},"release":{"type":"string"},"risk":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OctopusDeploy":{"description":"advisory.OctopusDeploy","properties":{"advisory_number":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Okta":{"description":"advisory.Okta","properties":{"affected_products":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"cwe":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"resolution":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Omron":{"description":"advisory.Omron","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OneE":{"description":"advisory.OneE","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OpenBSD":{"description":"advisory.OpenBSD","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"patch":{"type":"string"},"release":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OpenCVDB":{"description":"advisory.OpenCVDB","properties":{"affected_platforms":{"items":{"type":"string"},"type":"array","uniqueItems":false},"affected_services":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"disclosed_at":{"type":"string"},"known_itw_exploitation":{"type":"boolean"},"manual_remediation":{"type":"string"},"published_at":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OpenJDK":{"description":"advisory.OpenJDK","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"openjdk_cves":{"items":{"$ref":"#/components/schemas/advisory.OpenJDKCVE"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OpenJDKCVE":{"description":"advisory.OpenJDKCVE","properties":{"cve":{"type":"string"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"}},"type":"object"},"advisory.OpenSSH":{"description":"advisory.OpenSSH","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OpenSSLSecAdv":{"description":"advisory.OpenSSLSecAdv","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_updated":{"type":"string"},"description":{"type":"string"},"filename":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"url":{"type":"string"},"vulnerabilities":{"items":{"$ref":"#/components/schemas/advisory.OpenSSLVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.OpenSSLVulnerability":{"description":"advisory.OpenSSLVulnerability","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"fixed":{"items":{"$ref":"#/components/schemas/advisory.FixAff"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.OpenStack":{"description":"advisory.OpenStack","properties":{"affects":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Opengear":{"description":"advisory.Opengear","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OracleCPU":{"description":"advisory.OracleCPU","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"product":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OracleCPUCSAF":{"description":"advisory.OracleCPUCSAF","properties":{"csaf":{"$ref":"#/components/schemas/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OriginalGHSA":{"description":"advisory.OriginalGHSA","properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.GHSAAffected"},"type":"array","uniqueItems":false},"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"database_specific":{"$ref":"#/components/schemas/advisory.GHSADatabaseSpecific"},"details":{"type":"string"},"id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.GHSAReference"},"type":"array","uniqueItems":false},"schema_version":{"type":"string"},"severity":{"items":{"$ref":"#/components/schemas/advisory.GHSASeverity"},"type":"array","uniqueItems":false},"summary":{"type":"string"}},"type":"object"},"advisory.OvalCVE":{"description":"advisory.OvalCVE","properties":{"href":{"type":"string"},"id":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.OvalReference":{"description":"advisory.OvalReference","properties":{"ref_id":{"type":"string"},"ref_url":{"type":"string"},"source":{"type":"string"}},"type":"object"},"advisory.Override":{"description":"advisory.Override","properties":{"_annotation":{"$ref":"#/components/schemas/advisory.OverrideAnnotation"},"cve":{"$ref":"#/components/schemas/advisory.OverrideCVE"}},"type":"object"},"advisory.OverrideAnnotation":{"description":"advisory.OverrideAnnotation","properties":{"cve_id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"reason":{"type":"string"},"snapshot":{"type":"string"},"triage_notes":{"$ref":"#/components/schemas/advisory.TriageNotes"}},"type":"object"},"advisory.OverrideCVE":{"description":"advisory.OverrideCVE","properties":{"configurations":{"items":{"$ref":"#/components/schemas/advisory.OverrideConfiguration"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.OverrideConfiguration":{"description":"advisory.OverrideConfiguration","properties":{"nodes":{"items":{"$ref":"#/components/schemas/advisory.CPENode"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.OwnCloud":{"description":"advisory.OwnCloud","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PGFix":{"description":"advisory.PGFix","properties":{"affected":{"type":"string"},"fixed":{"type":"string"}},"type":"object"},"advisory.PHPMyAdmin":{"description":"advisory.PHPMyAdmin","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PKCert":{"description":"advisory.PKCert","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PTC":{"description":"advisory.PTC","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PTMDescriptions":{"description":"advisory.PTMDescriptions","properties":{"cweId":{"type":"string"},"description":{"type":"string"},"lang":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.Package":{"description":"advisory.Package","properties":{"filename":{"type":"string"},"name":{"description":"sort","type":"string"},"release":{"type":"string"},"src":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.PackageStat":{"description":"advisory.PackageStat","properties":{"cpe":{"type":"string"},"fix_state":{"type":"string"},"package_name":{"type":"string"},"product_name":{"type":"string"}},"type":"object"},"advisory.PacketstormExploit":{"description":"advisory.PacketstormExploit","properties":{"author":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"download_url":{"type":"string"},"md5":{"type":"string"},"summary":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Palantir":{"description":"advisory.Palantir","properties":{"affected_products":{"type":"string"},"background":{"type":"string"},"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PaloAltoAdvisory":{"description":"advisory.PaloAltoAdvisory","properties":{"affected":{"type":"string"},"applicableVersions":{"type":"string"},"attackComplexity":{"type":"string"},"attackRequirements":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"confidentialityImpact":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvssbaseScore":{"type":"string"},"datePublished":{"type":"string"},"dateUpdated":{"type":"string"},"date_added":{"type":"string"},"id":{"type":"string"},"integrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"problem":{"type":"string"},"product":{"type":"string"},"scope":{"type":"string"},"severity":{"type":"string"},"solution":{"type":"string"},"title":{"type":"string"},"unaffected":{"type":"string"},"url":{"type":"string"},"userInteraction":{"type":"string"},"workaround":{"type":"string"}},"type":"object"},"advisory.Panasonic":{"description":"advisory.Panasonic","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PaperCut":{"description":"advisory.PaperCut","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Patch":{"description":"advisory.Patch","properties":{"advisory_id":{"type":"string"},"component":{"type":"string"},"link":{"type":"string"},"os_sw":{"type":"string"}},"type":"object"},"advisory.Pega":{"description":"advisory.Pega","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"score":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PhilipsAdvisory":{"description":"advisory.PhilipsAdvisory","properties":{"affected_products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_updated":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PhoenixContactAdvisory":{"description":"advisory.PhoenixContactAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vde":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.PostgresSQL":{"description":"advisory.PostgresSQL","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"pg_fix":{"items":{"$ref":"#/components/schemas/advisory.PGFix"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PowerDNS":{"description":"advisory.PowerDNS","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PrimeVersion":{"description":"advisory.PrimeVersion","properties":{"jdK":{"type":"string"},"prime":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.Product":{"description":"advisory.Product","properties":{"name":{"type":"string"},"product_id":{"type":"string"},"product_identification_helper":{"$ref":"#/components/schemas/advisory.IdentificationHelper"}},"type":"object"},"advisory.ProductBranch":{"description":"ProductTree contains information about the product tree (branches only).\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#322-product-tree-property","properties":{"branches":{"items":{"$ref":"#/components/schemas/advisory.ProductBranch"},"type":"array","uniqueItems":false},"category":{"type":"string"},"name":{"type":"string"},"product":{"$ref":"#/components/schemas/advisory.Product"},"relationships":{"items":{"$ref":"#/components/schemas/advisory.CSAFRelationship"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.ProductSpecificDetail":{"description":"advisory.ProductSpecificDetail","properties":{"ID":{"type":"string"},"display_value":{"type":"string"}},"type":"object"},"advisory.ProductsAffected":{"description":"advisory.ProductsAffected","properties":{"cve":{"type":"string"},"description":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.Progress":{"description":"advisory.Progress","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Proofpoint":{"description":"advisory.Proofpoint","properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Publisher":{"description":"advisory.Publisher","properties":{"category":{"type":"string"},"contact_details":{"type":"string"},"issuing_authority":{"type":"string"},"name":{"type":"string"},"namespace":{"type":"string"}},"type":"object"},"advisory.PureStorage":{"description":"advisory.PureStorage","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"product":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PyPAAdvisory":{"description":"advisory.PyPAAdvisory","properties":{"advisory_id":{"description":"ID is the PYSEC- identifier","type":"string"},"affected":{"description":"Affected will list out the vulnerable versions.","items":{"$ref":"#/components/schemas/advisory.PyPAAffected"},"type":"array","uniqueItems":false},"aliases":{"description":"Aliases are other identifiers that refer to this, such as a CVE","items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"description":"Details discuss the vulnerability information","type":"string"},"modified":{"description":"Modified is non-zero Time if entry was updated","type":"string"},"published":{"description":"Published is the datetime when this was released","type":"string"},"references":{"description":"References are links to more detailed advisories, fixes, etc.","items":{"$ref":"#/components/schemas/advisory.PyPAReference"},"type":"array","uniqueItems":false},"was_withdrawn":{"description":"WasWD indicates if the advisory was withdrawn or not.","type":"boolean"},"withdrawn":{"description":"Withdrawn is non-zero if this advisory has been withdrawn","type":"string"}},"type":"object"},"advisory.PyPAAffected":{"description":"advisory.PyPAAffected","properties":{"package":{"$ref":"#/components/schemas/advisory.PyPAPackage"},"ranges":{"items":{"$ref":"#/components/schemas/advisory.PyPARange"},"type":"array","uniqueItems":false},"versions":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.PyPAEvent":{"description":"advisory.PyPAEvent","properties":{"fixed":{"type":"string"},"introduced":{"type":"string"}},"type":"object"},"advisory.PyPAPackage":{"description":"advisory.PyPAPackage","properties":{"ecosystem":{"type":"string"},"name":{"type":"string"},"purl":{"type":"string"}},"type":"object"},"advisory.PyPARange":{"description":"advisory.PyPARange","properties":{"events":{"items":{"$ref":"#/components/schemas/advisory.PyPAEvent"},"type":"array","uniqueItems":false},"ranges_type":{"type":"string"}},"type":"object"},"advisory.PyPAReference":{"description":"advisory.PyPAReference","properties":{"refs_type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.QNAPAdvisory":{"description":"advisory.QNAPAdvisory","properties":{"affected":{"type":"string"},"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"last_update_date":{"type":"string"},"link":{"type":"string"},"severity":{"type":"string"},"severity_number":{"type":"string"},"status":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.QQID":{"description":"advisory.QQID","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss3_score":{"type":"string"},"cvss_score":{"type":"string"},"date_added":{"type":"string"},"qid":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.QSB":{"description":"advisory.QSB","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Qualcomm":{"description":"advisory.Qualcomm","properties":{"chipsets":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"score":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Qualys":{"description":"advisory.Qualys","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"exploits":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.QualysQID":{"description":"advisory.QualysQID","properties":{"consequence":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_v2":{"items":{"$ref":"#/components/schemas/advisory.CvsssV2_3"},"type":"array","uniqueItems":false},"cvss_v3":{"items":{"$ref":"#/components/schemas/advisory.CvsssV2_3"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_insert":{"type":"string"},"description":{"type":"string"},"patches":{"items":{"$ref":"#/components/schemas/advisory.Patch"},"type":"array","uniqueItems":false},"published":{"type":"string"},"qid":{"type":"string"},"severity":{"type":"string"},"solution":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vendor_refs":{"items":{"$ref":"#/components/schemas/advisory.VendorRef"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.RDescription":{"description":"advisory.RDescription","properties":{"value":{"type":"string"}},"type":"object"},"advisory.RNote":{"description":"advisory.RNote","properties":{"audience":{"type":"string"},"ordinal":{"type":"string"},"text":{"type":"string"},"title":{"type":"string"},"type":{"description":"diff between xml \u0026\u0026 json","type":"integer"}},"type":"object"},"advisory.RRevision":{"description":"advisory.RRevision","properties":{"date":{"type":"string"},"description":{"$ref":"#/components/schemas/advisory.RDescription"},"number":{"type":"string"}},"type":"object"},"advisory.RScoreSet":{"description":"advisory.RScoreSet","properties":{"base_score":{"type":"string"},"product_id":{"type":"string"},"temporal_score":{"type":"string"},"vector":{"type":"string"}},"type":"object"},"advisory.RThreat":{"description":"advisory.RThreat","properties":{"Date":{"type":"string"},"DateSpecified":{"type":"boolean"},"Description":{"$ref":"#/components/schemas/advisory.IVal"},"ProductID":{"items":{"type":"string"},"type":"array","uniqueItems":false},"Type":{"description":"diff","type":"integer"}},"type":"object"},"advisory.Range":{"description":"advisory.Range","properties":{"events":{"items":{"$ref":"#/components/schemas/advisory.Event"},"type":"array","uniqueItems":false},"repo":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.RansomwareExploit":{"description":"advisory.RansomwareExploit","properties":{"associated_capecs":{"items":{"$ref":"#/components/schemas/advisory.Capec"},"type":"array","uniqueItems":false},"associated_cwes":{"items":{"$ref":"#/components/schemas/advisory.CweData"},"type":"array","uniqueItems":false},"associated_mitre_attack_techniques":{"items":{"$ref":"#/components/schemas/advisory.MitreAttackTechWithRefs"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve_references":{"items":{"$ref":"#/components/schemas/advisory.CVEReference"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"malpedia_url":{"type":"string"},"ransomware_family":{"type":"string"},"tools":{"items":{"$ref":"#/components/schemas/advisory.Tool"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.RecordType":{"description":"advisory.RecordType","properties":{"finding":{"type":"string"},"id":{"type":"string"},"kind":{"type":"string"}},"type":"object"},"advisory.RedLion":{"description":"advisory.RedLion","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RedhatCVE":{"description":"advisory.RedhatCVE","properties":{"advisories":{"items":{"type":"string"},"type":"array","uniqueItems":false},"advisory_csaf_vex_url":{"items":{"type":"string"},"type":"array","uniqueItems":false},"affected_packages":{"description":"used for un-marshlling from redhat","items":{"type":"string"},"type":"array","uniqueItems":false},"affected_release":{"items":{"$ref":"#/components/schemas/advisory.AffectedRel"},"type":"array","uniqueItems":false},"bugzilla":{"type":"string"},"bugzilla_description":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve_csaf_vex_url":{"type":"string"},"cvss3_score":{"type":"string"},"cvss3_scoring_vector":{"type":"string"},"cvss_score":{"type":"number"},"cvss_scoring_vector":{"type":"string"},"cwe":{"type":"string"},"package_state":{"items":{"$ref":"#/components/schemas/advisory.PackageStat"},"type":"array","uniqueItems":false},"packages":{"description":"used to index into vulncheck OS","items":{"$ref":"#/components/schemas/advisory.VulnCheckPackage"},"type":"array","uniqueItems":false},"public_date":{"type":"string"},"resource_url":{"type":"string"},"severity":{"type":"string"}},"type":"object"},"advisory.Reference":{"description":"advisory.Reference","properties":{"href":{"description":"sort","type":"string"},"id":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.RelatedRule":{"description":"advisory.RelatedRule","properties":{"id":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.RemediationData":{"description":"advisory.RemediationData","properties":{"category":{"type":"string"},"date":{"type":"string"},"details":{"type":"string"},"entitlements":{"items":{"type":"string"},"type":"array","uniqueItems":false},"group_ids":{"items":{"type":"string"},"type":"array","uniqueItems":false},"product_ids":{"items":{"type":"string"},"type":"array","uniqueItems":false},"restart_required":{"$ref":"#/components/schemas/advisory.RestartData"}},"type":"object"},"advisory.Renesas":{"description":"advisory.Renesas","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ReportedExploit":{"description":"advisory.ReportedExploit","properties":{"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RestartData":{"description":"advisory.RestartData","properties":{"category":{"type":"string"},"details":{"type":"string"}},"type":"object"},"advisory.RevisionHistory":{"description":"advisory.RevisionHistory","properties":{"date":{"type":"string"},"number":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.Revive":{"description":"advisory.Revive","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RhelCVE":{"description":"advisory.RhelCVE","properties":{"csaf":{"$ref":"#/components/schemas/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Roche":{"description":"advisory.Roche","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"roche_cves":{"items":{"$ref":"#/components/schemas/advisory.RocheCVE"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RocheCVE":{"description":"advisory.RocheCVE","properties":{"cve":{"type":"string"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"}},"type":"object"},"advisory.Rockwell":{"description":"advisory.Rockwell","properties":{"affected_products":{"items":{"$ref":"#/components/schemas/advisory.RockwellAffectedProduct"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"impact":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RockwellAffectedProduct":{"description":"advisory.RockwellAffectedProduct","properties":{"affectedCatalogNumber":{"type":"string"},"affectedVersion":{"type":"string"},"correctedVersion":{"type":"string"},"cve":{"type":"string"},"product":{"type":"string"}},"type":"object"},"advisory.RockyAdvisory":{"description":"advisory.RockyAdvisory","properties":{"affectedProducts":{"items":{"type":"string"},"type":"array","uniqueItems":false},"buildReferences":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cves":{"items":{"$ref":"#/components/schemas/advisory.RockyCve"},"type":"array","uniqueItems":false},"description":{"type":"string"},"fixes":{"items":{"$ref":"#/components/schemas/advisory.RockyFix"},"type":"array","uniqueItems":false},"name":{"type":"string"},"publishedAt":{"type":"string"},"rebootSuggested":{"type":"boolean"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"rpms":{"$ref":"#/components/schemas/advisory.RockyRpms"},"severity":{"type":"string"},"shortCode":{"type":"string"},"solution":{"type":"string"},"synopsis":{"type":"string"},"topic":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.RockyCve":{"description":"advisory.RockyCve","properties":{"cvss3BaseScore":{"type":"string"},"cvss3ScoringVector":{"type":"string"},"cwe":{"type":"string"},"name":{"type":"string"},"sourceBy":{"type":"string"},"sourceLink":{"type":"string"}},"type":"object"},"advisory.RockyErrata":{"description":"advisory.RockyErrata","properties":{"advisory":{"$ref":"#/components/schemas/advisory.RockyAdvisory"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"packages":{"items":{"$ref":"#/components/schemas/advisory.RockyPackage"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.RockyFix":{"description":"advisory.RockyFix","properties":{"description":{"type":"string"},"sourceBy":{"type":"string"},"sourceLink":{"type":"string"},"ticket":{"type":"string"}},"type":"object"},"advisory.RockyPackage":{"description":"advisory.RockyPackage","properties":{"distro":{"type":"string"},"name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.RockyRpms":{"additionalProperties":{"$ref":"#/components/schemas/advisory.RockyVersion"},"description":"advisory.RockyRpms","type":"object"},"advisory.RockyVersion":{"description":"advisory.RockyVersion","properties":{"nvras":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.Rsync":{"description":"advisory.Rsync","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Ruckus":{"description":"advisory.Ruckus","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RustsecAdvisory":{"description":"advisory.RustsecAdvisory","properties":{"advisory":{"$ref":"#/components/schemas/advisory.RustsecFrontMatterAdvisory"},"affected":{"$ref":"#/components/schemas/advisory.RustsecAffected"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"versions":{"$ref":"#/components/schemas/advisory.RustsecFrontMatterVersions"}},"type":"object"},"advisory.RustsecAffected":{"description":"advisory.RustsecAffected","properties":{"arch":{"items":{"type":"string"},"type":"array","uniqueItems":false},"functions":{"type":"string"},"os":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.RustsecFrontMatterAdvisory":{"description":"advisory.RustsecFrontMatterAdvisory","properties":{"aliases":{"description":"Vulnerability aliases, e.g. CVE IDs (optional but recommended)\nRequest a CVE for your RustSec vulns: https://iwantacve.org/","items":{"type":"string"},"type":"array","uniqueItems":false},"categories":{"description":"Optional: Categories this advisory falls under. Valid categories are:\n\"code-execution\", \"crypto-failure\", \"denial-of-service\", \"file-disclosure\"\n\"format-injection\", \"memory-corruption\", \"memory-exposure\", \"privilege-escalation\"","items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"description":"Optional: a Common Vulnerability Scoring System score. More information\ncan be found on the CVSS website, https://www.first.org/cvss/.","type":"string"},"date":{"description":"Disclosure date of the advisory as an RFC 3339 date (mandatory)","type":"string"},"informational":{"description":"Optional: Indicates the type of informational security advisory\n - \"unsound\" for soundness issues\n - \"unmaintained\" for crates that are no longer maintained\n - \"notice\" for other informational notices","type":"string"},"keywords":{"description":"Freeform keywords which describe this vulnerability, similar to Cargo (optional)","items":{"type":"string"},"type":"array","uniqueItems":false},"package":{"description":"Name of the affected crate (mandatory)","type":"string"},"references":{"description":"URL to additional helpful references regarding the advisory (optional)","items":{"type":"string"},"type":"array","uniqueItems":false},"related":{"description":"Related vulnerabilities (optional)\ne.g. CVE for a C library wrapped by a -sys crate)","items":{"type":"string"},"type":"array","uniqueItems":false},"rustsec_id":{"description":"Identifier for the advisory (mandatory). Will be assigned a \"RUSTSEC-YYYY-NNNN\"\nidentifier e.g. RUSTSEC-2018-0001. Please use \"RUSTSEC-0000-0000\" in PRs.","type":"string"},"url":{"description":"URL to a long-form description of this issue, e.g. a GitHub issue/PR,\na change log entry, or a blogpost announcing the release (optional)","type":"string"},"withdrawn":{"description":"Whether the advisory is withdrawn (optional)","type":"string"}},"type":"object"},"advisory.RustsecFrontMatterVersions":{"description":"advisory.RustsecFrontMatterVersions","properties":{"patched":{"items":{"type":"string"},"type":"array","uniqueItems":false},"unaffected":{"description":"Versions which were never vulnerable (optional)","items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.SAAdvisory":{"description":"advisory.SAAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"threats":{"type":"string"},"vendor":{"type":"string"},"warningDate":{"type":"string"},"warningNumber":{"type":"string"}},"type":"object"},"advisory.SAP":{"description":"advisory.SAP","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SECConsult":{"description":"advisory.SECConsult","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SSASource":{"description":"advisory.SSASource","properties":{"document":{"$ref":"#/components/schemas/advisory.SiemensDocument"},"product_tree":{"$ref":"#/components/schemas/advisory.SiemensProductTree"},"vulnerabilities":{"items":{"$ref":"#/components/schemas/advisory.SiemensVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.SSDAdvisory":{"description":"advisory.SSDAdvisory","properties":{"analysis":{"type":"string"},"credit":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"link":{"type":"string"},"poc":{"description":"contains actual poc code","type":"string"},"published":{"type":"string"},"response_ref":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.Safran":{"description":"advisory.Safran","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SaintExploit":{"description":"advisory.SaintExploit","properties":{"bid":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"osvdb":{"type":"string"},"saint_id":{"type":"string"},"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SalesForce":{"description":"advisory.SalesForce","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"integer"},"link":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.Samba":{"description":"advisory.Samba","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"issues":{"type":"string"},"patches":{"items":{"type":"string"},"type":"array","uniqueItems":false},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Sandisk":{"description":"advisory.Sandisk","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SansDshield":{"description":"advisory.SansDshield","properties":{"count":{"type":"integer"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"firstSeen":{"type":"string"},"lastSeen":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SchneiderCVE":{"description":"advisory.SchneiderCVE","properties":{"cve":{"type":"string"},"cvss_score3":{"type":"string"},"cvss_score4":{"type":"string"},"cvss_vector3":{"type":"string"},"cvss_vector4":{"type":"string"}},"type":"object"},"advisory.SchneiderElectricAdvisory":{"description":"advisory.SchneiderElectricAdvisory","properties":{"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"pdf_url":{"type":"string"},"schneider_cves":{"items":{"$ref":"#/components/schemas/advisory.SchneiderCVE"},"type":"array","uniqueItems":false},"schneider_electric_id":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Schutzwerk":{"description":"advisory.Schutzwerk","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SecFix":{"description":"advisory.SecFix","properties":{"arch":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"release":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.SecurityBulletin":{"description":"advisory.SecurityBulletin","properties":{"acknowledgement":{"type":"string"},"bulletinId":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvedetails":{"items":{"$ref":"#/components/schemas/advisory.CVEDetail"},"type":"array"},"date_added":{"type":"string"},"hardwareUpdates":{"items":{"$ref":"#/components/schemas/advisory.HardwareUpdate"},"type":"array"},"lastUpdated":{"type":"string"},"link":{"type":"string"},"revisions":{"items":{"$ref":"#/components/schemas/advisory.NvidiaRevision"},"type":"array"},"severity":{"type":"string"},"softwareUpdates":{"items":{"$ref":"#/components/schemas/advisory.SoftwareUpdate"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.SecurityLab":{"description":"advisory.SecurityLab","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"title_ru":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.SeebugExploit":{"description":"advisory.SeebugExploit","properties":{"author":{"type":"string"},"category":{"type":"string"},"cnnvd":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cnvd":{"items":{"type":"string"},"type":"array","uniqueItems":false},"component":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"find_time":{"type":"string"},"name":{"type":"string"},"ssv_id":{"type":"string"},"submitter":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Sel":{"description":"advisory.Sel","properties":{"acknowledgement":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SentinelOne":{"description":"advisory.SentinelOne","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ServiceNow":{"description":"advisory.ServiceNow","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SevenZip":{"description":"advisory.SevenZip","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Severity":{"description":"advisory.Severity","properties":{"score":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.ShadowServerExploitedVulnerability":{"description":"advisory.ShadowServerExploitedVulnerability","properties":{"cnvd":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"detections_last_1_day":{"type":"integer"},"detections_last_30_days":{"type":"integer"},"detections_last_7_days":{"type":"integer"},"detections_last_90_days":{"type":"integer"},"edb":{"type":"string"},"in_kev":{"type":"boolean"},"is_iot":{"type":"boolean"},"is_ransomware":{"type":"boolean"},"product":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"},"vulnerability_id":{"type":"string"},"vulnerability_link":{"type":"string"}},"type":"object"},"advisory.Shielder":{"description":"advisory.Shielder","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Sick":{"description":"advisory.Sick","properties":{"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"id":{"type":"string"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"}},"type":"object"},"advisory.SiemensAcknowledgments":{"description":"advisory.SiemensAcknowledgments","properties":{"names":{"items":{"type":"string"},"type":"array","uniqueItems":false},"organization":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.SiemensAdvisory":{"description":"advisory.SiemensAdvisory","properties":{"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvrf_url":{"type":"string"},"date_added":{"type":"string"},"html_url":{"type":"string"},"id":{"type":"string"},"last_update":{"description":"could potentially kill this in the future as it's a dupe","type":"string"},"pdf_url":{"type":"string"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"ssa":{"$ref":"#/components/schemas/advisory.SSASource"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"txt_url":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.SiemensBranch":{"description":"advisory.SiemensBranch","properties":{"branches":{"items":{"$ref":"#/components/schemas/advisory.SiemensSubBranch"},"type":"array","uniqueItems":false},"category":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.SiemensCVSSV3":{"description":"advisory.SiemensCVSSV3","properties":{"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.SiemensCWE":{"description":"advisory.SiemensCWE","properties":{"id":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.SiemensDistribution":{"description":"advisory.SiemensDistribution","properties":{"text":{"type":"string"},"tlp":{"$ref":"#/components/schemas/advisory.SiemensTLP"}},"type":"object"},"advisory.SiemensDocument":{"description":"advisory.SiemensDocument","properties":{"acknowledgments":{"items":{"$ref":"#/components/schemas/advisory.SiemensAcknowledgments"},"type":"array","uniqueItems":false},"category":{"type":"string"},"csaf_version":{"type":"string"},"distribution":{"$ref":"#/components/schemas/advisory.SiemensDistribution"},"notes":{"items":{"$ref":"#/components/schemas/advisory.SiemensNotes"},"type":"array","uniqueItems":false},"publisher":{"$ref":"#/components/schemas/advisory.SiemensPublisher"},"references":{"items":{"$ref":"#/components/schemas/advisory.SiemensReferences"},"type":"array","uniqueItems":false},"title":{"type":"string"},"tracking":{"$ref":"#/components/schemas/advisory.SiemensTracking"}},"type":"object"},"advisory.SiemensEngine":{"description":"advisory.SiemensEngine","properties":{"name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.SiemensGenerator":{"description":"advisory.SiemensGenerator","properties":{"engine":{"$ref":"#/components/schemas/advisory.SiemensEngine"}},"type":"object"},"advisory.SiemensNotes":{"description":"advisory.SiemensNotes","properties":{"category":{"type":"string"},"text":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.SiemensProduct":{"description":"advisory.SiemensProduct","properties":{"name":{"type":"string"},"product_id":{"type":"string"},"product_identification_helper":{"$ref":"#/components/schemas/advisory.SiemensProductIdentificationHelper"}},"type":"object"},"advisory.SiemensProductIdentificationHelper":{"description":"advisory.SiemensProductIdentificationHelper","properties":{"model_numbers":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.SiemensProductStatus":{"description":"advisory.SiemensProductStatus","properties":{"known_affected":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.SiemensProductTree":{"description":"advisory.SiemensProductTree","properties":{"branches":{"items":{"$ref":"#/components/schemas/advisory.SiemensBranch"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.SiemensPublisher":{"description":"advisory.SiemensPublisher","properties":{"category":{"type":"string"},"contact_details":{"type":"string"},"name":{"type":"string"},"namespace":{"type":"string"}},"type":"object"},"advisory.SiemensReferences":{"description":"advisory.SiemensReferences","properties":{"category":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SiemensRemediation":{"description":"advisory.SiemensRemediation","properties":{"category":{"type":"string"},"details":{"type":"string"},"product_ids":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.SiemensRevisionHistory":{"description":"advisory.SiemensRevisionHistory","properties":{"date":{"type":"string"},"legacy_version":{"type":"string"},"number":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.SiemensScore":{"description":"advisory.SiemensScore","properties":{"cvss_v3":{"$ref":"#/components/schemas/advisory.SiemensCVSSV3"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.SiemensSubBranch":{"description":"advisory.SiemensSubBranch","properties":{"branches":{"items":{"$ref":"#/components/schemas/advisory.SiemensSubSubBranch"},"type":"array","uniqueItems":false},"category":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.SiemensSubSubBranch":{"description":"advisory.SiemensSubSubBranch","properties":{"category":{"type":"string"},"name":{"type":"string"},"product":{"$ref":"#/components/schemas/advisory.SiemensProduct"}},"type":"object"},"advisory.SiemensTLP":{"description":"advisory.SiemensTLP","properties":{"label":{"type":"string"}},"type":"object"},"advisory.SiemensTracking":{"description":"advisory.SiemensTracking","properties":{"current_release_date":{"type":"string"},"generator":{"$ref":"#/components/schemas/advisory.SiemensGenerator"},"id":{"type":"string"},"initial_release_date":{"type":"string"},"revision_history":{"items":{"$ref":"#/components/schemas/advisory.SiemensRevisionHistory"},"type":"array","uniqueItems":false},"status":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.SiemensVulnerability":{"description":"advisory.SiemensVulnerability","properties":{"cve":{"type":"string"},"cwe":{"$ref":"#/components/schemas/advisory.SiemensCWE"},"notes":{"items":{"$ref":"#/components/schemas/advisory.SiemensNotes"},"type":"array","uniqueItems":false},"product_status":{"$ref":"#/components/schemas/advisory.SiemensProductStatus"},"references":{"items":{"$ref":"#/components/schemas/advisory.SiemensReferences"},"type":"array","uniqueItems":false},"remediations":{"items":{"$ref":"#/components/schemas/advisory.SiemensRemediation"},"type":"array","uniqueItems":false},"scores":{"items":{"$ref":"#/components/schemas/advisory.SiemensScore"},"type":"array","uniqueItems":false},"title":{"type":"string"}},"type":"object"},"advisory.SierraWireless":{"description":"advisory.SierraWireless","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"swid":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SigmaRule":{"description":"advisory.SigmaRule","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"mitre_attack_techniques":{"items":{"type":"string"},"type":"array","uniqueItems":false},"sigma_rule":{"$ref":"#/components/schemas/advisory.SigmaRuleRule"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SigmaRuleRule":{"description":"advisory.SigmaRuleRule","properties":{"author":{"type":"string"},"date":{"type":"string"},"description":{"type":"string"},"detection":{"additionalProperties":{},"type":"object"},"false_positives":{"items":{"type":"string"},"type":"array","uniqueItems":false},"fields":{"items":{"type":"string"},"type":"array","uniqueItems":false},"id":{"type":"string"},"level":{"type":"string"},"logsource":{"$ref":"#/components/schemas/advisory.LogSource"},"modified":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"related":{"items":{"$ref":"#/components/schemas/advisory.RelatedRule"},"type":"array","uniqueItems":false},"status":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"}},"type":"object"},"advisory.SingCert":{"description":"advisory.SingCert","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated":{"type":"string"}},"type":"object"},"advisory.Sitecore":{"description":"advisory.Sitecore","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"refs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"summary_ja":{"type":"string"},"title":{"type":"string"},"title_ja":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Slackware":{"description":"advisory.Slackware","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SoftwareUpdate":{"description":"advisory.SoftwareUpdate","properties":{"affectedVersion":{"type":"string"},"cves":{"items":{"type":"string"},"type":"array"},"operatingSystem":{"type":"string"},"softwareProduct":{"type":"string"},"updatedVersion":{"type":"string"}},"type":"object"},"advisory.SolarWindsAdvisory":{"description":"advisory.SolarWindsAdvisory","properties":{"affected_products":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"date_added":{"type":"string"},"fixed_version":{"type":"string"},"severity":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Solr":{"description":"advisory.Solr","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Sonatype":{"description":"advisory.Sonatype","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SonicWallAdvisory":{"description":"advisory.SonicWallAdvisory","properties":{"advisory_id":{"type":"string"},"affected_products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"cvss_vector":{"type":"string"},"cvss_version":{"type":"number"},"cwe":{"type":"string"},"date_added":{"type":"string"},"impact":{"type":"string"},"is_workaround_available":{"type":"boolean"},"last_updated_when":{"type":"string"},"published_when":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vuln_status":{"type":"string"},"vulnerable_products_list":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.SpacelabsHealthcareAdvisory":{"description":"advisory.SpacelabsHealthcareAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Splunk":{"description":"advisory.Splunk","properties":{"advisory_id":{"type":"string"},"affected_products":{"items":{"$ref":"#/components/schemas/advisory.SplunkProduct"},"type":"array","uniqueItems":false},"bug_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SplunkProduct":{"description":"advisory.SplunkProduct","properties":{"affected_version":{"type":"string"},"component":{"type":"string"},"fixed_version":{"type":"string"},"product":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Spring":{"description":"advisory.Spring","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Stormshield":{"description":"advisory.Stormshield","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.StrykerAdvisory":{"description":"advisory.StrykerAdvisory","properties":{"affected_components":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Sudo":{"description":"advisory.Sudo","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"type":"string"},"fix":{"type":"string"},"impact":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"workaround":{"type":"string"}},"type":"object"},"advisory.SuseSecurity":{"description":"advisory.SuseSecurity","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SwisslogHealthcareAdvisory":{"description":"advisory.SwisslogHealthcareAdvisory","properties":{"affected_components":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Symfony":{"description":"advisory.Symfony","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Synacktiv":{"description":"advisory.Synacktiv","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SyncroSoft":{"description":"advisory.SyncroSoft","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Synology":{"description":"advisory.Synology","properties":{"affected_products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"last_updated":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"status":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Syss":{"description":"advisory.Syss","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TI":{"description":"advisory.TI","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"incident_id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TPLink":{"description":"advisory.TPLink","properties":{"bulletin_id":{"type":"integer"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TWCertAdvisory":{"description":"advisory.TWCertAdvisory","properties":{"affected_cn":{"type":"string"},"affected_en":{"type":"string"},"credit_cn":{"type":"string"},"credit_en":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description_cn":{"type":"string"},"description_en":{"type":"string"},"link":{"type":"string"},"solution_cn":{"type":"string"},"solution_en":{"type":"string"},"title_cn":{"type":"string"},"title_en":{"type":"string"},"tvnid":{"type":"string"}},"type":"object"},"advisory.Tailscale":{"description":"advisory.Tailscale","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TalosAdvisory":{"description":"advisory.TalosAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"talos_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TeamViewer":{"description":"advisory.TeamViewer","properties":{"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TenableResearchAdvisory":{"description":"advisory.TenableResearchAdvisory","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Tencent":{"description":"advisory.Tencent","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary_cn":{"type":"string"},"title_cn":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Thales":{"description":"advisory.Thales","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TheMissingLink":{"description":"advisory.TheMissingLink","properties":{"affected_versions":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed_versions":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ThermoFisher":{"description":"advisory.ThermoFisher","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ThreatActorWithExternalObjects":{"description":"advisory.ThreatActorWithExternalObjects","properties":{"associated_capecs":{"items":{"$ref":"#/components/schemas/advisory.Capec"},"type":"array","uniqueItems":false},"associated_cwes":{"items":{"$ref":"#/components/schemas/advisory.CweData"},"type":"array","uniqueItems":false},"associated_mitre_attack_techniques":{"items":{"$ref":"#/components/schemas/advisory.MitreAttackTechWithRefs"},"type":"array","uniqueItems":false},"country":{"type":"string"},"cve_references":{"items":{"$ref":"#/components/schemas/advisory.CVEReference"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"malpedia_url":{"type":"string"},"misp_id":{"type":"string"},"misp_threat_actor":{"$ref":"#/components/schemas/advisory.MISPValueNoID"},"mitre_attack_group":{"$ref":"#/components/schemas/advisory.MITREAttackGroupNoID"},"mitre_group_cti":{"$ref":"#/components/schemas/advisory.MitreGroupCTI"},"mitre_id":{"type":"string"},"threat_actor_name":{"type":"string"},"tools":{"items":{"$ref":"#/components/schemas/advisory.Tool"},"type":"array","uniqueItems":false},"vendor_names_for_threat_actors":{"items":{"$ref":"#/components/schemas/advisory.VendorNameForThreatActor"},"type":"array","uniqueItems":false},"vendors_and_products_targeted":{"items":{"$ref":"#/components/schemas/advisory.VendorProduct"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.ThreatData":{"description":"advisory.ThreatData","properties":{"category":{"type":"string"},"details":{"type":"string"},"product_ids":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.Tibco":{"description":"advisory.Tibco","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"impact":{"type":"string"},"overview":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Timeline":{"description":"advisory.Timeline","properties":{"lang":{"type":"string"},"time":{"description":"FIXME: flip to time","type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.Tool":{"description":"advisory.Tool","properties":{"name":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.ToolRef"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.ToolRef":{"description":"advisory.ToolRef","properties":{"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Tracking":{"description":"advisory.Tracking","properties":{"current_release_date":{"type":"string"},"id":{"type":"string"},"initial_release_date":{"type":"string"},"revision_history":{"items":{"$ref":"#/components/schemas/advisory.RevisionHistory"},"type":"array","uniqueItems":false},"status":{"type":"string"},"version":{"description":"should match last 'number' in []RevisionHistory","type":"string"}},"type":"object"},"advisory.TrackingID":{"description":"advisory.TrackingID","properties":{"system_name":{"type":"string"},"text":{"type":"string"}},"type":"object"},"advisory.TraneTechnology":{"description":"advisory.TraneTechnology","properties":{"brand":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"product":{"type":"string"},"summary":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TrendMicro":{"description":"advisory.TrendMicro","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"scores":{"type":"string"},"severity":{"type":"string"},"solution":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TriageNotes":{"description":"advisory.TriageNotes","properties":{"references":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.Trustwave":{"description":"advisory.Trustwave","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.USD":{"description":"advisory.USD","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.USOMAdvisory":{"description":"advisory.USOMAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"effect_tr":{"type":"string"},"general_information_tr":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"solution_tr":{"type":"string"},"title_tr":{"type":"string"},"trid":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Ubiquiti":{"description":"advisory.Ubiquiti","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"links":{"items":{"type":"string"},"type":"array","uniqueItems":false},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.UbuntuCVE":{"description":"advisory.UbuntuCVE","properties":{"affected_packages":{"items":{"$ref":"#/components/schemas/advisory.AffectedUbuntuPackage"},"type":"array","uniqueItems":false},"cve":{"description":"Candidate","items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"description":"PublicDate","type":"string"},"reference_urls":{"description":"References","items":{"type":"string"},"type":"array","uniqueItems":false},"source_url":{"type":"string"},"status":{"description":"active || retired","type":"string"},"ubuntu_url":{"type":"string"},"usn":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.UbuntuPackageReleaseStatus":{"description":"advisory.UbuntuPackageReleaseStatus","properties":{"affected":{"type":"boolean"},"fixed":{"type":"boolean"},"fixed_version":{"type":"string"},"lts":{"type":"boolean"},"release":{"type":"string"},"release_long":{"type":"string"},"release_version":{"type":"string"},"status":{"type":"string"}},"type":"object"},"advisory.Unify":{"description":"advisory.Unify","properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Unisoc":{"description":"advisory.Unisoc","properties":{"access_vector":{"type":"string"},"affected_chipsets":{"type":"string"},"affected_software":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"rating":{"type":"string"},"score":{"type":"string"},"severity":{"type":"string"},"technology":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vulnerability":{"type":"string"}},"type":"object"},"advisory.Update":{"description":"advisory.Update","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"description":"sort // key","type":"string"},"issued":{"$ref":"#/components/schemas/advisory.DateTime"},"os_arch":{"type":"string"},"os_version":{"type":"string"},"packages":{"items":{"$ref":"#/components/schemas/advisory.Package"},"type":"array","uniqueItems":false},"references":{"items":{"$ref":"#/components/schemas/advisory.Reference"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"},"updated":{"$ref":"#/components/schemas/advisory.DateTime"}},"type":"object"},"advisory.Updated":{"description":"advisory.Updated","type":"object"},"advisory.V3AcceptanceLevel":{"description":"advisory.V3AcceptanceLevel","properties":{"description":{"type":"string"},"lastModified":{"type":"string"}},"type":"object"},"advisory.VCCPEDictionary":{"description":"advisory.VCCPEDictionary","properties":{"baseCPE":{"type":"string"},"versions":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.VCVulnerableCPEs":{"description":"advisory.VCVulnerableCPEs","properties":{"cve":{"type":"string"},"unrolled":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.VDEAdvisory":{"description":"advisory.VDEAdvisory","properties":{"csaf_json":{"$ref":"#/components/schemas/advisory.CSAF"},"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vde":{"type":"string"}},"type":"object"},"advisory.VLC":{"description":"advisory.VLC","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VMWareAdvisory":{"description":"advisory.VMWareAdvisory","properties":{"AdvisoryID":{"type":"string"},"AdvisoryURL":{"type":"string"},"CVSSv3Range":{"type":"string"},"IssueDate":{"type":"string"},"Severity":{"type":"string"},"Synopsis":{"type":"string"},"UpdatedOn":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.VYAIREAdvisory":{"description":"advisory.VYAIREAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VanDyke":{"description":"advisory.VanDyke","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VapidLabsAdvisory":{"description":"advisory.VapidLabsAdvisory","properties":{"author":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"exploit":{"type":"string"},"link":{"type":"string"},"title":{"type":"string"},"vapidId":{"type":"string"},"vendor":{"type":"string"},"vulnerability":{"type":"string"}},"type":"object"},"advisory.Veeam":{"description":"advisory.Veeam","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"solution":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VendorNameForThreatActor":{"description":"advisory.VendorNameForThreatActor","properties":{"threat_actor_name":{"type":"string"},"url":{"type":"string"},"vendor_name":{"type":"string"}},"type":"object"},"advisory.VendorProduct":{"description":"advisory.VendorProduct","properties":{"product":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.VendorRef":{"description":"advisory.VendorRef","properties":{"vendor_ref":{"type":"string"},"vendor_ref_url":{"type":"string"}},"type":"object"},"advisory.Veritas":{"description":"advisory.Veritas","properties":{"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Virtuozzo":{"description":"advisory.Virtuozzo","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VoidSec":{"description":"advisory.VoidSec","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VulnCheck":{"description":"advisory.VulnCheck","properties":{"affecting":{"items":{"type":"string"},"type":"array","uniqueItems":false},"credit":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"cvss_v3_vector":{"type":"string"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VulnCheckCVEListV5":{"description":"advisory.VulnCheckCVEListV5","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"mitre_ref":{"$ref":"#/components/schemas/advisory.MitreCVEListV5Ref"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VulnCheckConfig":{"description":"advisory.VulnCheckConfig","properties":{"config":{"items":{"$ref":"#/components/schemas/advisory.NVD20Configuration"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"}},"type":"object"},"advisory.VulnCheckKEV":{"description":"advisory.VulnCheckKEV","properties":{"_timestamp":{"type":"string"},"cisa_date_added":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwes":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"dueDate":{"type":"string"},"knownRansomwareCampaignUse":{"type":"string"},"product":{"type":"string"},"reported_exploited_by_vulncheck_canaries":{"type":"boolean"},"required_action":{"type":"string"},"shortDescription":{"type":"string"},"vendorProject":{"type":"string"},"vulncheck_reported_exploitation":{"items":{"$ref":"#/components/schemas/advisory.ReportedExploit"},"type":"array","uniqueItems":false},"vulncheck_xdb":{"items":{"$ref":"#/components/schemas/advisory.XDB"},"type":"array","uniqueItems":false},"vulnerabilityName":{"type":"string"}},"type":"object"},"advisory.VulnCheckPackage":{"description":"advisory.VulnCheckPackage","properties":{"arch":{"type":"string"},"distro":{"type":"string"},"filename":{"type":"string"},"md5":{"type":"string"},"name":{"type":"string"},"purl":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.VulnerableDebianPackage":{"description":"advisory.VulnerableDebianPackage","properties":{"associated_cves":{"items":{"$ref":"#/components/schemas/advisory.DebianCVE"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"package_name":{"type":"string"}},"type":"object"},"advisory.VulnerableProduct":{"description":"advisory.VulnerableProduct","properties":{"name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Vulnrichment":{"description":"advisory.Vulnrichment","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"mitre_ref":{"$ref":"#/components/schemas/advisory.VulnrichmentCVERef"},"url":{"type":"string"}},"type":"object"},"advisory.VulnrichmentCVERef":{"description":"advisory.VulnrichmentCVERef","properties":{"containers":{"$ref":"#/components/schemas/advisory.VulnrichmentContainers"},"cveMetadata":{"$ref":"#/components/schemas/advisory.MCveMetadata"},"dataType":{"type":"string"},"dataVersion":{"type":"string"}},"type":"object"},"advisory.VulnrichmentContainers":{"description":"advisory.VulnrichmentContainers","properties":{"adp":{"items":{"$ref":"#/components/schemas/advisory.ADP"},"type":"array","uniqueItems":false},"cna":{"$ref":"#/components/schemas/advisory.MCna"}},"type":"object"},"advisory.VulnrichmentContent":{"description":"advisory.VulnrichmentContent","properties":{"id":{"type":"string"},"options":{"items":{"$ref":"#/components/schemas/advisory.VulnrichmentOption"},"type":"array","uniqueItems":false},"role":{"type":"string"},"timestamp":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.VulnrichmentMetric":{"description":"advisory.VulnrichmentMetric","properties":{"other":{"$ref":"#/components/schemas/advisory.VulnrichmentOther"}},"type":"object"},"advisory.VulnrichmentOption":{"description":"advisory.VulnrichmentOption","properties":{"Automatable":{"type":"string"},"Exploitation":{"type":"string"},"Technical Impact":{"type":"string"}},"type":"object"},"advisory.VulnrichmentOther":{"description":"advisory.VulnrichmentOther","properties":{"content":{"$ref":"#/components/schemas/advisory.VulnrichmentContent"},"type":{"type":"string"}},"type":"object"},"advisory.WRT":{"description":"advisory.WRT","properties":{"advisory":{"type":"string"},"affectedVersions":{"type":"string"},"credits":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"mitigations":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"requirements":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.WatchGuard":{"description":"advisory.WatchGuard","properties":{"advisory_id":{"type":"string"},"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"resolution":{"type":"string"},"score":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.WhatsApp":{"description":"advisory.WhatsApp","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Wibu":{"description":"advisory.Wibu","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Wireshark":{"description":"advisory.Wireshark","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.WithSecure":{"description":"advisory.WithSecure","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.WolfSSL":{"description":"advisory.WolfSSL","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"fixed_version":{"type":"string"},"severity":{"type":"string"}},"type":"object"},"advisory.Wolfi":{"description":"advisory.Wolfi","properties":{"apkurl":{"type":"string"},"archs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"description":"un-used","type":"string"},"packages":{"items":{"$ref":"#/components/schemas/advisory.WolfiPackage"},"type":"array","uniqueItems":false},"reponame":{"type":"string"},"urlprefix":{"type":"string"}},"type":"object"},"advisory.WolfiPackage":{"description":"advisory.WolfiPackage","properties":{"name":{"type":"string"},"secfixes":{"items":{"$ref":"#/components/schemas/advisory.WolfiSecFix"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.WolfiSecFix":{"description":"advisory.WolfiSecFix","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"version":{"type":"string"}},"type":"object"},"advisory.Wordfence":{"description":"advisory.Wordfence","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.XDB":{"description":"advisory.XDB","properties":{"clone_ssh_url":{"type":"string"},"date_added":{"type":"string"},"exploit_type":{"type":"string"},"xdb_id":{"type":"string"},"xdb_url":{"type":"string"}},"type":"object"},"advisory.Xen":{"description":"advisory.Xen","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updatedAt":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Xerox":{"description":"advisory.Xerox","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Xiaomi":{"description":"advisory.Xiaomi","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"internal_id":{"type":"string"},"summary":{"type":"string"},"summary_cn":{"type":"string"},"title":{"type":"string"},"title_cn":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Xylem":{"description":"advisory.Xylem","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"xsa":{"type":"string"}},"type":"object"},"advisory.Yamaha":{"description":"advisory.Yamaha","properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary_ja":{"type":"string"},"title_ja":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.YokogawaAdvisory":{"description":"advisory.YokogawaAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"name":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"ysar_id":{"type":"string"}},"type":"object"},"advisory.Yubico":{"description":"advisory.Yubico","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ZDI":{"description":"advisory.ZDI","properties":{"cves":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"cvss_version":{"type":"string"},"discoverers":{"items":{"type":"string"},"type":"array","uniqueItems":false},"filter_ids_dv":{"items":{"type":"string"},"type":"array","uniqueItems":false},"last_updated_at":{"type":"string"},"products":{"items":{"$ref":"#/components/schemas/advisory.ZDIProduct"},"type":"array","uniqueItems":false},"public_advisory":{"type":"string"},"published_date":{"type":"string"},"responses":{"items":{"$ref":"#/components/schemas/advisory.ZDIResponse"},"type":"array","uniqueItems":false},"title":{"type":"string"},"zdi_can":{"type":"string"},"zdi_public":{"type":"string"}},"type":"object"},"advisory.ZDIProduct":{"description":"advisory.ZDIProduct","properties":{"name":{"type":"string"},"uri":{"type":"string"},"vendor":{"$ref":"#/components/schemas/advisory.ZDIVendor"}},"type":"object"},"advisory.ZDIResponse":{"description":"advisory.ZDIResponse","properties":{"text":{"type":"string"},"uri":{"type":"string"},"vendor":{"$ref":"#/components/schemas/advisory.ZDIResponseVendor"}},"type":"object"},"advisory.ZDIResponseVendor":{"description":"advisory.ZDIResponseVendor","properties":{"name":{"type":"string"}},"type":"object"},"advisory.ZDIVendor":{"description":"advisory.ZDIVendor","properties":{"name":{"type":"string"},"uri":{"type":"string"}},"type":"object"},"advisory.Zebra":{"description":"advisory.Zebra","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ZeroDayAdvisory":{"description":"advisory.ZeroDayAdvisory","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"zdi":{"$ref":"#/components/schemas/advisory.ZDI"}},"type":"object"},"advisory.ZeroScienceAdvisory":{"description":"advisory.ZeroScienceAdvisory","properties":{"advisoryId":{"type":"string"},"affectedVersions":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"impact":{"type":"string"},"link":{"type":"string"},"poC":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"risk":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.Zimbra":{"description":"advisory.Zimbra","properties":{"bugs":{"items":{"type":"integer"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"fix":{"type":"string"},"rating":{"type":"string"},"reporter":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.Zoom":{"description":"advisory.Zoom","properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"zsb":{"type":"string"}},"type":"object"},"advisory.Zscaler":{"description":"advisory.Zscaler","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ZuluVersion":{"description":"advisory.ZuluVersion","properties":{"jdk":{"type":"string"},"type":{"type":"string"},"zulu":{"type":"string"}},"type":"object"},"advisory.Zuso":{"description":"advisory.Zuso","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"zaid":{"type":"string"}},"type":"object"},"advisory.Zyxel":{"description":"advisory.Zyxel","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.BaseMetricV2":{"description":"api.BaseMetricV2","properties":{"acInsufInfo":{"type":"boolean"},"cvssV2":{"$ref":"#/components/schemas/api.CVSSV2"},"exploitabilityScore":{"type":"number"},"impactScore":{"type":"number"},"obtainAllPrivilege":{"type":"boolean"},"obtainOtherPrivilege":{"type":"boolean"},"obtainUserPrivilege":{"type":"boolean"},"severity":{"type":"string"},"userInteractionRequired":{"type":"boolean"}},"type":"object"},"api.BaseMetricV3":{"description":"api.BaseMetricV3","properties":{"cvssV3":{"$ref":"#/components/schemas/api.CVSSV3"},"exploitabilityScore":{"type":"number"},"impactScore":{"type":"number"}},"type":"object"},"api.CPE":{"description":"api.CPE","properties":{"edition":{"type":"string"},"language":{"type":"string"},"other":{"type":"string"},"part":{"type":"string"},"product":{"type":"string"},"sw_edition":{"type":"string"},"target_hw":{"type":"string"},"target_sw":{"type":"string"},"update":{"type":"string"},"vendor":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.CPEMatch":{"description":"api.CPEMatch","properties":{"cpe22Uri":{"type":"string"},"cpe23Uri":{"type":"string"},"cpe_name":{"items":{"$ref":"#/components/schemas/api.CPEName"},"type":"array","uniqueItems":false},"versionEndExcluding":{"type":"string"},"versionEndIncluding":{"type":"string"},"versionStartExcluding":{"type":"string"},"versionStartIncluding":{"type":"string"},"vulnerable":{"type":"boolean"}},"type":"object"},"api.CPEName":{"description":"api.CPEName","properties":{"cpe22Uri":{"type":"string"},"cpe23Uri":{"type":"string"},"lastModifiedDate":{"type":"string"}},"type":"object"},"api.CVE":{"description":"api.CVE","properties":{"CVE_data_meta":{"$ref":"#/components/schemas/api.CVEDataMeta"},"data_format":{"type":"string"},"data_type":{"type":"string"},"data_version":{"type":"string"},"description":{"$ref":"#/components/schemas/api.Description"},"problemtype":{"$ref":"#/components/schemas/api.ProblemType"},"references":{"$ref":"#/components/schemas/api.References"}},"type":"object"},"api.CVEDataMeta":{"description":"api.CVEDataMeta","properties":{"ASSIGNER":{"type":"string"},"ID":{"type":"string"}},"type":"object"},"api.CVEDataMetaExtended":{"description":"api.CVEDataMetaExtended","properties":{"ALIAS":{"type":"string"},"ASSIGNER":{"type":"string"},"ID":{"type":"string"},"STATUS":{"type":"string"}},"type":"object"},"api.CVEExtended":{"description":"api.CVEExtended","properties":{"CVE_data_meta":{"$ref":"#/components/schemas/api.CVEDataMetaExtended"},"categorization":{"$ref":"#/components/schemas/api.CategorizationExtended"},"data_format":{"type":"string"},"data_type":{"type":"string"},"data_version":{"type":"string"},"description":{"$ref":"#/components/schemas/api.Description"},"problemtype":{"$ref":"#/components/schemas/api.ProblemTypeExtended"},"references":{"$ref":"#/components/schemas/api.ReferencesExtended"}},"type":"object"},"api.CVSSV2":{"description":"api.CVSSV2","properties":{"accessComplexity":{"type":"string"},"accessVector":{"type":"string"},"authentication":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.CVSSV3":{"description":"api.CVSSV3","properties":{"attackComplexity":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"scope":{"type":"string"},"userInteraction":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.CWE":{"description":"api.CWE","properties":{"abstraction":{"type":"string"},"description":{"type":"string"},"kev_count":{"type":"integer"},"status":{"type":"string"},"structure":{"type":"string"},"vulncheck_nvd_count":{"type":"integer"},"weakness_id":{"type":"string"},"weakness_name":{"type":"string"},"weighted_score":{"type":"number"}},"type":"object"},"api.CategorizationExtended":{"description":"api.CategorizationExtended","properties":{"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"api.ClientFingerprints":{"description":"api.ClientFingerprints","properties":{"hassh":{"type":"string"},"ja3":{"type":"string"},"ja4":{"type":"string"}},"type":"object"},"api.Configurations":{"description":"api.Configurations","properties":{"CVE_data_version":{"type":"string"},"nodes":{"items":{"$ref":"#/components/schemas/api.Nodes"},"type":"array","uniqueItems":false}},"type":"object"},"api.CveItems":{"description":"api.CveItems","properties":{"configurations":{"$ref":"#/components/schemas/api.Configurations"},"cve":{"$ref":"#/components/schemas/api.CVE"},"impact":{"$ref":"#/components/schemas/api.Impact"},"lastModifiedDate":{"type":"string"},"publishedDate":{"type":"string"},"vcConfigurations":{"$ref":"#/components/schemas/api.Configurations"},"vcVulnerableCPEs":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"api.CveItemsExtended":{"description":"api.CveItemsExtended","properties":{"_timestamp":{"type":"string"},"configurations":{"$ref":"#/components/schemas/api.Configurations"},"cve":{"$ref":"#/components/schemas/api.CVEExtended"},"date_added":{"type":"string"},"documentGenerationDate":{"description":"the deep tag instructs deep.Equal to ignore this field (used during OpenSearch loading)","type":"string"},"impact":{"$ref":"#/components/schemas/api.ImpactExtended"},"lastModifiedDate":{"type":"string"},"mitre_attack_techniques":{"items":{"$ref":"#/components/schemas/api.MitreAttackTech"},"type":"array","uniqueItems":false},"publishedDate":{"type":"string"},"related_attack_patterns":{"items":{"$ref":"#/components/schemas/api.RelatedAttackPattern"},"type":"array","uniqueItems":false},"vcConfigurations":{"$ref":"#/components/schemas/api.Configurations"},"vcVulnerableCPEs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"vulnerable_cpes":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"api.DateTime":{"description":"api.DateTime","type":"object"},"api.Description":{"description":"api.Description","properties":{"description_data":{"items":{"$ref":"#/components/schemas/api.DescriptionData"},"type":"array","uniqueItems":false}},"type":"object"},"api.DescriptionData":{"description":"api.DescriptionData","properties":{"lang":{"type":"string"},"value":{"type":"string"}},"type":"object"},"api.EPSS":{"description":"exclude EPSS from changelog","properties":{"epss_percentile":{"type":"number"},"epss_score":{"type":"number"},"last_modified":{"type":"string"}},"type":"object"},"api.EPSSData":{"description":"api.EPSSData","properties":{"_timestamp":{"type":"string"},"cve":{"type":"string"},"epss_percentile":{"type":"number"},"epss_score":{"type":"number"}},"type":"object"},"api.ExploitChain":{"description":"api.ExploitChain","properties":{"cves":{"items":{"$ref":"#/components/schemas/api.ExploitChainCVE"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.ExploitChainCVE":{"description":"api.ExploitChainCVE","properties":{"cve":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.ExploitV3Result":{"description":"api.ExploitV3Result","properties":{"_timestamp":{"description":"ignore this field when checking for differences/changes","type":"string"},"commercial_exploit_found":{"type":"boolean"},"counts":{"$ref":"#/components/schemas/api.ExploitsV3Count"},"date_added":{"type":"string"},"epss":{"$ref":"#/components/schemas/api.EPSS"},"exploits":{"items":{"$ref":"#/components/schemas/api.NormalizedExploitV3Entry"},"type":"array","uniqueItems":false},"id":{"type":"string"},"inKEV":{"type":"boolean"},"inVCKEV":{"type":"boolean"},"max_exploit_maturity":{"type":"string"},"public_exploit_found":{"type":"boolean"},"reported_exploitation":{"items":{"$ref":"#/components/schemas/api.NormalizedReportV3Entry"},"type":"array","uniqueItems":false},"reported_exploited":{"type":"boolean"},"reported_exploited_by_botnets":{"type":"boolean"},"reported_exploited_by_honeypot_service":{"type":"boolean"},"reported_exploited_by_ransomware":{"type":"boolean"},"reported_exploited_by_threat_actors":{"type":"boolean"},"reported_exploited_by_vulncheck_canaries":{"type":"boolean"},"timeline":{"$ref":"#/components/schemas/api.ExploitsV3Timeline"},"trending":{"$ref":"#/components/schemas/api.ExploitsTrending"},"weaponized_exploit_found":{"type":"boolean"}},"type":"object"},"api.ExploitsChange":{"description":"api.ExploitsChange","properties":{"change_time":{"type":"string"},"change_type":{"type":"string"},"field":{"type":"string"},"new_value":{},"old_value":{}},"type":"object"},"api.ExploitsChangelog":{"description":"api.ExploitsChangelog","properties":{"changes":{"items":{"$ref":"#/components/schemas/api.ExploitsChange"},"type":"array","uniqueItems":false},"cve":{"type":"string"}},"type":"object"},"api.ExploitsTrending":{"description":"api.ExploitsTrending","properties":{"github":{"type":"boolean"}},"type":"object"},"api.ExploitsV3Count":{"description":"api.ExploitsV3Count","properties":{"botnets":{"type":"integer"},"exploits":{"type":"integer"},"ransomware_families":{"type":"integer"},"threat_actors":{"type":"integer"}},"type":"object"},"api.ExploitsV3Timeline":{"description":"api.ExploitsV3Timeline","properties":{"cisa_kev_date_added":{"type":"string"},"cisa_kev_date_due":{"type":"string"},"first_exploit_published":{"type":"string"},"first_exploit_published_weaponized_or_higher":{"type":"string"},"first_reported_botnet":{"type":"string"},"first_reported_ransomware":{"type":"string"},"first_reported_threat_actor":{"type":"string"},"most_recent_exploit_published":{"type":"string"},"most_recent_reported_botnet":{"type":"string"},"most_recent_reported_ransomware":{"type":"string"},"most_recent_reported_threat_actor":{"type":"string"},"nvd_last_modified":{"description":"it's often the case the nvd record was updated, but in a way that is irrelevant to the contents\nof a vc exploits record.","type":"string"},"nvd_published":{"type":"string"},"vulncheck_kev_date_added":{"type":"string"},"vulncheck_kev_date_due":{"type":"string"}},"type":"object"},"api.HTTPDetails":{"description":"api.HTTPDetails","properties":{"http_request_body":{"type":"string"},"http_user_agent":{"type":"string"},"method":{"type":"string"},"protocol":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.Impact":{"description":"api.Impact","properties":{"baseMetricV2":{"$ref":"#/components/schemas/api.BaseMetricV2"},"baseMetricV3":{"$ref":"#/components/schemas/api.BaseMetricV3"},"metricV40":{"$ref":"#/components/schemas/advisory.CVSSV40"}},"type":"object"},"api.ImpactExtended":{"description":"api.ImpactExtended","properties":{"baseMetricV2":{"$ref":"#/components/schemas/api.BaseMetricV2"},"baseMetricV3":{"$ref":"#/components/schemas/api.BaseMetricV3"},"correctedBaseMetricV3":{"$ref":"#/components/schemas/api.BaseMetricV3"},"epss":{"$ref":"#/components/schemas/api.EPSS"},"metricV40":{"$ref":"#/components/schemas/advisory.CVSSV40"},"ssvc":{"items":{"$ref":"#/components/schemas/api.SSVC"},"type":"array","uniqueItems":false},"temporalMetricV2":{"$ref":"#/components/schemas/api.TemporalMetricV2"},"temporalMetricV3":{"$ref":"#/components/schemas/api.TemporalMetricV3"},"temporalV3Corrected":{"$ref":"#/components/schemas/api.TemporalMetricV3"},"threatMetricV40":{"$ref":"#/components/schemas/advisory.CVSSV40Threat"}},"type":"object"},"api.InitialAccess":{"description":"api.InitialAccess","properties":{"artifacts":{"description":"Artifacts holds the set of available artifacts for this vulnerability, such as exploit, shodan queries, PCAP traces, and others.","items":{"$ref":"#/components/schemas/api.InitialAccessArtifact"},"type":"array","uniqueItems":false},"cve":{"description":"CVE identifier for the given initial access record.","type":"string"},"inKEV":{"description":"InKEV is true if this artifact is in CISA's Known Exploited Vulnerabilities (KEV) data set; otherwise, false.","type":"boolean"},"inVCKEV":{"description":"InVCKEV is true if this artifact is in VulnCheck's Known Exploited Vulnerabilities (VCKEV) data set; otherwise, false.","type":"boolean"},"vulnerable_cpes":{"description":"VulnerableCPEs is the list of vulnerable CPE strings associated with this CVE and artifact(s).","items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"api.InitialAccessArtifact":{"description":"api.InitialAccessArtifact","properties":{"artifactName":{"description":"ArtifactName is a title to associate with this artifact.","type":"string"},"artifactsURL":{"description":"ArtifactsURL are URLs to the available artifact.","items":{"type":"string"},"type":"array","uniqueItems":false},"baiduQueries":{"description":"...","items":{"type":"string"},"type":"array","uniqueItems":false},"baiduRawQueries":{"description":"...","items":{"type":"string"},"type":"array","uniqueItems":false},"censysLegacyQueries":{"description":"CensysLegacyQueries are legacy queries for examining potential Internet-exposed devices \u0026 applications with Censys in URL form.","items":{"type":"string"},"type":"array","uniqueItems":false},"censysLegacyRawQueries":{"description":"CensysLegacyRawQueries are raw legacy queries for examining potential Internet-exposed devices \u0026 applications with Censys.","items":{"type":"string"},"type":"array","uniqueItems":false},"censysQueries":{"description":"CensysQueries are queries for examining potential Internet-exposed devices \u0026 applications with Censys in URL form.","items":{"type":"string"},"type":"array","uniqueItems":false},"censysRawQueries":{"description":"CensysRawQueries are raw queries for examining potential Internet-exposed devices \u0026 applications with Censys.","items":{"type":"string"},"type":"array","uniqueItems":false},"chain":{"description":"Chain can represent the chain of exploitation.","items":{"type":"string"},"type":"array","uniqueItems":false},"cloneSSHURL":{"description":"CloneSSHURL is the git URL to clone the artifact with.","type":"string"},"dateAdded":{"description":"DateAdded is when this artifact entry was first added to the InitialAccess data set.","type":"string"},"driftnetQueries":{"description":"DriftnetQueries are queries for examining Internet exposed services with Driftnet.","items":{"type":"string"},"type":"array","uniqueItems":false},"driftnetRawQueries":{"description":"DriftnetRawQueries are queries for examining Internet exposed services with Driftnet.","items":{"type":"string"},"type":"array","uniqueItems":false},"exploit":{"description":"Exploit indicates whether or not an exploit is available in this artifact.","type":"boolean"},"fofaQueries":{"description":"FOFAQueries are raw queries for examining potential Internet-exposed devices \u0026 applications with FOFA.","items":{"type":"string"},"type":"array","uniqueItems":false},"fofaRawQueries":{"items":{"type":"string"},"type":"array","uniqueItems":false},"googleQueries":{"description":"google queries","items":{"type":"string"},"type":"array","uniqueItems":false},"googleRawQueries":{"description":"raw google queries","items":{"type":"string"},"type":"array","uniqueItems":false},"greynoiseQueries":{"description":"GreynoiseQueries are queries for finding the vulnerability via honeypot data.","items":{"type":"string"},"type":"array","uniqueItems":false},"mitreAttackTechniques":{"description":"MITRE ATT\u0026CK techniques","items":{"type":"string"},"type":"array","uniqueItems":false},"nmapScript":{"description":"NmapScript indicates whether or not an nmap script for scanning environment exists in this artifact.","type":"boolean"},"pcap":{"description":"PCAP indicates whether of not a package capture of the exploit PoC exploiting a vulnerable system exists in this artifact.","type":"boolean"},"product":{"description":"Product are the software that has the vulnerability.","items":{"type":"string"},"type":"array","uniqueItems":false},"related":{"description":"Related is a set of related cves.","items":{"type":"string"},"type":"array","uniqueItems":false},"shodanQueries":{"description":"ShodanQueries are queries for examining potential Internet-exposed devices \u0026 applications with Shodan in URL form.","items":{"type":"string"},"type":"array","uniqueItems":false},"shodanRawQueries":{"description":"ShodanRawQueries are raw queries for examining potential Internet-exposed devices \u0026 applications with Shodan.","items":{"type":"string"},"type":"array","uniqueItems":false},"sigmaRule":{"description":"SigmaRule indicates whether or not a Sigma rule designed to detect the exploitation of the vulnerability over the network exists in this artifact.","type":"boolean"},"snortRule":{"description":"SnortRule indicates whether or not a Snort rule designed to detect the exploitation of the vulnerability over the network exists in this artifact.","type":"boolean"},"suricataRule":{"description":"SuricataRule indicates whether or not a Suricata rule designed to detect the exploitation of the vulnerability over the network exists in this artifact.","type":"boolean"},"targetDocker":{"description":"TargetDocker indicates whether or not there is an available docker image with the vulnerability.","type":"boolean"},"targetEncryptedComms":{"description":"Encrypted communications?","type":"string"},"targetService":{"description":"TargetService indicates the service (HTTP, FTP, etc) that this exploit targets.","type":"string"},"vendor":{"description":"Vendor of the vulnerable product","type":"string"},"versionScanner":{"description":"VersionScanner indicates whether or not the exploit PoC can determine if target system is vulnerable without sending exploit payload in this artifact.","type":"boolean"},"yara":{"description":"YARA indicates whether or not a YARA rule designed to detect the exploit on an endpoint exists in this artifact.","type":"boolean"},"zeroday":{"description":"Zeroday indicates whether or not it is a VulnCheck zeroday.","type":"boolean"},"zoomEyeQueries":{"description":"ZoomEyeQueries are raw queries for examining potential Internet-exposed devices \u0026 applications with ZoomEye.","items":{"type":"string"},"type":"array","uniqueItems":false},"zoomEyeRawQueries":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"api.MitreAttackTech":{"description":"api.MitreAttackTech","properties":{"d3fendmapping":{"items":{"$ref":"#/components/schemas/api.MitreMitigation2D3fendMapping"},"type":"array","uniqueItems":false},"detections":{"items":{"$ref":"#/components/schemas/api.MitreDetectionTech"},"type":"array","uniqueItems":false},"domain":{"type":"string"},"id":{"type":"string"},"mitigations":{"items":{"$ref":"#/components/schemas/api.MitreMitigationTech"},"type":"array","uniqueItems":false},"name":{"type":"string"},"subtechnique":{"type":"boolean"},"tactics":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"api.MitreAttackToCVE":{"description":"api.MitreAttackToCVE","properties":{"cve_list":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"technique_id":{"$ref":"#/components/schemas/api.MitreAttackTech"}},"type":"object"},"api.MitreD3fendTechnique":{"description":"api.MitreD3fendTechnique","properties":{"id":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.MitreDetectionTech":{"description":"api.MitreDetectionTech","properties":{"datacomponent":{"type":"string"},"datasource":{"type":"string"},"detects":{"type":"string"},"id":{"type":"string"}},"type":"object"},"api.MitreMitigation2D3fendMapping":{"description":"api.MitreMitigation2D3fendMapping","properties":{"d3fendtechniques":{"items":{"$ref":"#/components/schemas/api.MitreD3fendTechnique"},"type":"array","uniqueItems":false},"id":{"type":"string"}},"type":"object"},"api.MitreMitigationTech":{"description":"api.MitreMitigationTech","properties":{"description":{"type":"string"},"id":{"type":"string"},"mitigation_url":{"type":"string"}},"type":"object"},"api.NVD20CPEMatch":{"description":"api.NVD20CPEMatch","properties":{"cpeLastModified":{"type":"string"},"created":{"type":"string"},"criteria":{"type":"string"},"lastModified":{"type":"string"},"matchCriteriaId":{"type":"string"},"matches":{"items":{"$ref":"#/components/schemas/api.NVD20CPEName"},"type":"array","uniqueItems":false},"status":{"type":"string"},"versionEndExcluding":{"type":"string"},"versionEndIncluding":{"type":"string"},"versionStartExcluding":{"type":"string"},"versionStartIncluding":{"type":"string"}},"type":"object"},"api.NVD20CPEName":{"description":"api.NVD20CPEName","properties":{"cpeName":{"type":"string"},"cpeNameId":{"type":"string"}},"type":"object"},"api.NVD20CVE":{"description":"api.NVD20CVE","properties":{"cisaActionDue":{"type":"string"},"cisaExploitAdd":{"type":"string"},"cisaRequiredAction":{"type":"string"},"cisaVulnerabilityName":{"type":"string"},"configurations":{"items":{"$ref":"#/components/schemas/advisory.NVD20Configuration"},"type":"array","uniqueItems":false},"descriptions":{"items":{"$ref":"#/components/schemas/api.NVD20Description"},"type":"array","uniqueItems":false},"evaluatorComment":{"type":"string"},"evaluatorImpact":{"type":"string"},"evaluatorSolution":{"type":"string"},"id":{"type":"string"},"lastModified":{"type":"string"},"metrics":{"$ref":"#/components/schemas/api.NVD20Metric"},"published":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/api.NVD20Reference"},"type":"array","uniqueItems":false},"sourceIdentifier":{"type":"string"},"vcConfigurations":{"items":{"$ref":"#/components/schemas/advisory.NVD20Configuration"},"type":"array","uniqueItems":false},"vcVulnerableCPEs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"vendorComments":{"items":{"$ref":"#/components/schemas/api.NVD20VendorComment"},"type":"array","uniqueItems":false},"vulnStatus":{"type":"string"},"weaknesses":{"items":{"$ref":"#/components/schemas/api.NVD20Weakness"},"type":"array","uniqueItems":false}},"type":"object"},"api.NVD20CVEExtended":{"description":"api.NVD20CVEExtended","properties":{"ALIAS":{"type":"string"},"STATUS":{"type":"string"},"_timestamp":{"description":"the deep tag instructs deep.Equal to ignore this field (used during OpenSearch loading)","type":"string"},"categorization":{"$ref":"#/components/schemas/api.CategorizationExtended"},"cisaActionDue":{"type":"string"},"cisaExploitAdd":{"type":"string"},"cisaRequiredAction":{"type":"string"},"cisaVulnerabilityName":{"type":"string"},"configurations":{"items":{"$ref":"#/components/schemas/advisory.NVD20Configuration"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"descriptions":{"items":{"$ref":"#/components/schemas/api.NVD20Description"},"type":"array","uniqueItems":false},"documentGenerationDate":{"type":"string"},"evaluatorComment":{"type":"string"},"evaluatorImpact":{"type":"string"},"evaluatorSolution":{"type":"string"},"id":{"type":"string"},"lastModified":{"type":"string"},"metrics":{"$ref":"#/components/schemas/api.NVD20MetricExtended"},"mitreAttackTechniques":{"items":{"$ref":"#/components/schemas/api.MitreAttackTech"},"type":"array","uniqueItems":false},"published":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/api.NVD20ReferenceExtended"},"type":"array","uniqueItems":false},"relatedAttackPatterns":{"items":{"$ref":"#/components/schemas/api.RelatedAttackPattern"},"type":"array","uniqueItems":false},"sourceIdentifier":{"type":"string"},"vcConfigurations":{"items":{"$ref":"#/components/schemas/advisory.NVD20Configuration"},"type":"array","uniqueItems":false},"vcVulnerableCPEs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"vendorComments":{"items":{"$ref":"#/components/schemas/api.NVD20VendorComment"},"type":"array","uniqueItems":false},"vulnStatus":{"type":"string"},"vulncheckKEVExploitAdd":{"type":"string"},"vulnerableCPEs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"weaknesses":{"items":{"$ref":"#/components/schemas/api.NVD20WeaknessExtended"},"type":"array","uniqueItems":false}},"type":"object"},"api.NVD20CvssDataV2":{"description":"api.NVD20CvssDataV2","properties":{"accessComplexity":{"type":"string"},"accessVector":{"type":"string"},"authentication":{"type":"string"},"availabilityImpact":{"type":"string"},"availabilityRequirement":{"type":"string"},"baseScore":{"type":"number"},"collateralDamagePotential":{"type":"string"},"confidentialityImpact":{"type":"string"},"confidentialityRequirement":{"type":"string"},"environmentalScore":{"type":"number"},"exploitability":{"type":"string"},"integrityImpact":{"type":"string"},"integrityRequirement":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"targetDistribution":{"type":"string"},"temporalScore":{"type":"number"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.NVD20CvssDataV3":{"description":"api.NVD20CvssDataV3","properties":{"attackComplexity":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"availabilityRequirement":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityImpact":{"type":"string"},"confidentialityRequirement":{"type":"string"},"environmentalScore":{"type":"number"},"environmentalSeverity":{"type":"string"},"exploitCodeMaturity":{"type":"string"},"integrityImpact":{"type":"string"},"integrityRequirement":{"type":"string"},"modifiedAttackComplexity":{"type":"string"},"modifiedAttackVector":{"type":"string"},"modifiedAvailabilityImpact":{"type":"string"},"modifiedConfidentialityImpact":{"type":"string"},"modifiedIntegrityImpact":{"type":"string"},"modifiedPrivilegesRequired":{"type":"string"},"modifiedScope":{"type":"string"},"modifiedUserInteraction":{"type":"string"},"privilegesRequired":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"scope":{"type":"string"},"temporalScore":{"type":"number"},"temporalSeverity":{"type":"string"},"userInteraction":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.NVD20CvssMetricV2":{"description":"api.NVD20CvssMetricV2","properties":{"acInsufInfo":{"type":"boolean"},"baseSeverity":{"type":"string"},"cvssData":{"$ref":"#/components/schemas/api.NVD20CvssDataV2"},"exploitabilityScore":{"type":"number"},"impactScore":{"type":"number"},"obtainAllPrivilege":{"type":"boolean"},"obtainOtherPrivilege":{"type":"boolean"},"obtainUserPrivilege":{"type":"boolean"},"source":{"type":"string"},"type":{"type":"string"},"userInteractionRequired":{"type":"boolean"}},"type":"object"},"api.NVD20CvssMetricV3":{"description":"api.NVD20CvssMetricV3","properties":{"cvssData":{"$ref":"#/components/schemas/api.NVD20CvssDataV3"},"exploitabilityScore":{"type":"number"},"impactScore":{"type":"number"},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.NVD20CvssMetricV40":{"description":"api.NVD20CvssMetricV40","properties":{"cvssData":{"$ref":"#/components/schemas/advisory.CVSSV40"},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.NVD20Description":{"description":"api.NVD20Description","properties":{"lang":{"type":"string"},"value":{"type":"string"}},"type":"object"},"api.NVD20Metric":{"description":"api.NVD20Metric","properties":{"cvssMetricV2":{"items":{"$ref":"#/components/schemas/api.NVD20CvssMetricV2"},"type":"array","uniqueItems":false},"cvssMetricV30":{"items":{"$ref":"#/components/schemas/api.NVD20CvssMetricV3"},"type":"array","uniqueItems":false},"cvssMetricV31":{"items":{"$ref":"#/components/schemas/api.NVD20CvssMetricV3"},"type":"array","uniqueItems":false},"cvssMetricV40":{"items":{"$ref":"#/components/schemas/api.NVD20CvssMetricV40"},"type":"array","uniqueItems":false}},"type":"object"},"api.NVD20MetricExtended":{"description":"api.NVD20MetricExtended","properties":{"cvssMetricV2":{"items":{"$ref":"#/components/schemas/api.NVD20CvssMetricV2"},"type":"array","uniqueItems":false},"cvssMetricV30":{"items":{"$ref":"#/components/schemas/api.NVD20CvssMetricV3"},"type":"array","uniqueItems":false},"cvssMetricV31":{"items":{"$ref":"#/components/schemas/api.NVD20CvssMetricV3"},"type":"array","uniqueItems":false},"cvssMetricV40":{"items":{"$ref":"#/components/schemas/api.NVD20CvssMetricV40"},"type":"array","uniqueItems":false},"epss":{"$ref":"#/components/schemas/api.EPSS"},"ssvc":{"items":{"$ref":"#/components/schemas/api.SSVC"},"type":"array","uniqueItems":false},"temporalCVSSV2":{"$ref":"#/components/schemas/api.NVD20TemporalCVSSV2"},"temporalCVSSV2Secondary":{"items":{"$ref":"#/components/schemas/api.NVD20TemporalCVSSV2"},"type":"array","uniqueItems":false},"temporalCVSSV30":{"$ref":"#/components/schemas/api.NVD20TemporalCVSSV3"},"temporalCVSSV30Secondary":{"items":{"$ref":"#/components/schemas/api.NVD20TemporalCVSSV3"},"type":"array","uniqueItems":false},"temporalCVSSV31":{"$ref":"#/components/schemas/api.NVD20TemporalCVSSV3"},"temporalCVSSV31Secondary":{"items":{"$ref":"#/components/schemas/api.NVD20TemporalCVSSV3"},"type":"array","uniqueItems":false},"threatCVSSV40":{"$ref":"#/components/schemas/api.NVD20ThreatCVSSV40"},"threatCVSSV40Secondary":{"items":{"$ref":"#/components/schemas/api.NVD20ThreatCVSSV40"},"type":"array","uniqueItems":false}},"type":"object"},"api.NVD20Reference":{"description":"api.NVD20Reference","properties":{"source":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"api.NVD20ReferenceExtended":{"description":"api.NVD20ReferenceExtended","properties":{"date_added":{"type":"string"},"external_id":{"type":"string"},"lang":{"type":"string"},"name":{"type":"string"},"previous_url":{"type":"string"},"refsource":{"type":"string"},"source":{"type":"string"},"status":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"api.NVD20TemporalAssociatedBaseMetric":{"description":"api.NVD20TemporalAssociatedBaseMetric","properties":{"baseScore":{"type":"number"},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.NVD20TemporalCVSSV2":{"description":"api.NVD20TemporalCVSSV2","properties":{"associatedBaseMetricV2":{"$ref":"#/components/schemas/api.NVD20TemporalAssociatedBaseMetric"},"exploitability":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"temporalScore":{"type":"number"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.NVD20TemporalCVSSV3":{"description":"api.NVD20TemporalCVSSV3","properties":{"associatedBaseMetricV3":{"$ref":"#/components/schemas/api.NVD20TemporalAssociatedBaseMetric"},"exploitCodeMaturity":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"temporalScore":{"type":"number"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.NVD20ThreatAssociatedBaseMetric":{"description":"api.NVD20ThreatAssociatedBaseMetric","properties":{"baseScore":{"type":"number"},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.NVD20ThreatCVSSV40":{"description":"api.NVD20ThreatCVSSV40","properties":{"associatedBaseMetricV40":{"$ref":"#/components/schemas/api.NVD20ThreatAssociatedBaseMetric"},"baseThreatScore":{"type":"number"},"baseThreatSeverity":{"type":"string"},"exploitMaturity":{"type":"string"}},"type":"object"},"api.NVD20VendorComment":{"description":"api.NVD20VendorComment","properties":{"comment":{"type":"string"},"lastModified":{"type":"string"},"organization":{"type":"string"}},"type":"object"},"api.NVD20Weakness":{"description":"api.NVD20Weakness","properties":{"description":{"items":{"$ref":"#/components/schemas/api.NVD20Description"},"type":"array","uniqueItems":false},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.NVD20WeaknessDescExtended":{"description":"api.NVD20WeaknessDescExtended","properties":{"lang":{"type":"string"},"name":{"type":"string"},"url":{"type":"string"},"value":{"type":"string"}},"type":"object"},"api.NVD20WeaknessExtended":{"description":"api.NVD20WeaknessExtended","properties":{"description":{"items":{"$ref":"#/components/schemas/api.NVD20WeaknessDescExtended"},"type":"array","uniqueItems":false},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.Nodes":{"description":"api.Nodes","properties":{"children":{"items":{"$ref":"#/components/schemas/api.Nodes"},"type":"array","uniqueItems":false},"cpe_match":{"items":{"$ref":"#/components/schemas/api.CPEMatch"},"type":"array","uniqueItems":false},"operator":{"type":"string"}},"type":"object"},"api.NormalizedExploitV3Entry":{"description":"api.NormalizedExploitV3Entry","properties":{"clone_ssh_url":{"type":"string"},"clone_ssh_url_cached":{"type":"string"},"date_added":{"type":"string"},"exploit_availability":{"type":"string"},"exploit_maturity":{"type":"string"},"exploit_type":{"type":"string"},"name":{"type":"string"},"reference_url":{"type":"string"},"refsource":{"type":"string"},"repo_id":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.NormalizedReportV3Entry":{"description":"api.NormalizedReportV3Entry","properties":{"date_added":{"type":"string"},"name":{"type":"string"},"refsource":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.OSSPackage":{"description":"api.OSSPackage","properties":{"artifacts":{"$ref":"#/components/schemas/api.OSSPackageArtifacts"},"cves":{"items":{"type":"string"},"type":"array","uniqueItems":false},"licenses":{"items":{"type":"string"},"type":"array","uniqueItems":false},"name":{"type":"string"},"published_date":{"type":"string"},"purl":{"items":{"type":"string"},"type":"array","uniqueItems":false},"research_attributes":{"$ref":"#/components/schemas/api.OSSPackageResearchAttributes"},"version":{"type":"string"},"vulnerabilities":{"items":{"$ref":"#/components/schemas/api.OSSPackageVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"api.OSSPackageArtifacts":{"description":"api.OSSPackageArtifacts","properties":{"binary":{"items":{"$ref":"#/components/schemas/api.OSSPackageDownloadInfo"},"type":"array","uniqueItems":false},"source":{"items":{"$ref":"#/components/schemas/api.OSSPackageDownloadInfo"},"type":"array","uniqueItems":false}},"type":"object"},"api.OSSPackageDownloadInfo":{"description":"api.OSSPackageDownloadInfo","properties":{"hashes":{"items":{"$ref":"#/components/schemas/api.OSSPackageHashInfo"},"type":"array","uniqueItems":false},"reference":{"type":"string"},"type":{"description":"See OSSPackageDownloadInfoType* consts","type":"string"},"url":{"type":"string"}},"type":"object"},"api.OSSPackageHashInfo":{"description":"api.OSSPackageHashInfo","properties":{"algorithm":{"description":"See OSSPackageHashInfoAlgo* consts","type":"string"},"type":{"description":"See OSSPackageHashInfoType* consts","type":"string"},"value":{"description":"hex string digest or link to hash","type":"string"}},"type":"object"},"api.OSSPackageResearchAttributes":{"description":"api.OSSPackageResearchAttributes","properties":{"abandoned":{"type":"boolean"},"eol":{"type":"boolean"},"is_malicious":{"type":"boolean"},"malicious_source":{"type":"string"},"repo_hijackable":{"type":"boolean"},"squatted_package":{"type":"string"}},"type":"object"},"api.OSSPackageVulnerability":{"description":"api.OSSPackageVulnerability","properties":{"detection":{"type":"string"},"fixed_version":{"type":"string"}},"type":"object"},"api.Package":{"description":"api.Package","properties":{"filename":{"type":"string"},"name":{"description":"sort","type":"string"},"release":{"type":"string"},"src":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.ProblemType":{"description":"api.ProblemType","properties":{"problemtype_data":{"items":{"$ref":"#/components/schemas/api.ProblemTypeData"},"type":"array","uniqueItems":false}},"type":"object"},"api.ProblemTypeData":{"description":"api.ProblemTypeData","properties":{"description":{"items":{"$ref":"#/components/schemas/api.ProblemTypeDescription"},"type":"array","uniqueItems":false}},"type":"object"},"api.ProblemTypeDataExtended":{"description":"api.ProblemTypeDataExtended","properties":{"description":{"items":{"$ref":"#/components/schemas/api.ProblemTypeDescriptionExtended"},"type":"array","uniqueItems":false}},"type":"object"},"api.ProblemTypeDescription":{"description":"api.ProblemTypeDescription","properties":{"lang":{"type":"string"},"value":{"type":"string"}},"type":"object"},"api.ProblemTypeDescriptionExtended":{"description":"api.ProblemTypeDescriptionExtended","properties":{"lang":{"type":"string"},"name":{"type":"string"},"url":{"type":"string"},"value":{"type":"string"}},"type":"object"},"api.ProblemTypeExtended":{"description":"api.ProblemTypeExtended","properties":{"problemtype_data":{"items":{"$ref":"#/components/schemas/api.ProblemTypeDataExtended"},"type":"array","uniqueItems":false}},"type":"object"},"api.Reference":{"description":"api.Reference","properties":{"href":{"description":"sort","type":"string"},"id":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.ReferenceData":{"description":"api.ReferenceData","properties":{"name":{"type":"string"},"refsource":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"api.ReferenceDataExtended":{"description":"api.ReferenceDataExtended","properties":{"date_added":{"type":"string"},"external_id":{"type":"string"},"lang":{"type":"string"},"name":{"type":"string"},"previous_url":{"type":"string"},"refsource":{"type":"string"},"status":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"api.References":{"description":"api.References","properties":{"reference_data":{"items":{"$ref":"#/components/schemas/api.ReferenceData"},"type":"array","uniqueItems":false}},"type":"object"},"api.ReferencesExtended":{"description":"api.ReferencesExtended","properties":{"reference_data":{"description":"ExploitData []NormalizedExploit `json:\"exploit_data,omitempty\"`\n\t\tThreatActorData []ThreatActorExtended `json:\"threat_actor_data,omitempty\"`\n\t\tRansomwareData []RansomwareReferenceData `json:\"ransomware_data,omitempty\"`\n\t\tAdvisoryData []AdvisoryExtended `json:\"advisory_data,omitempty\"`\n\t\tIdentifierData []IdentifierExtended `json:\"identifier_data,omitempty\"`","items":{"$ref":"#/components/schemas/api.ReferenceDataExtended"},"type":"array","uniqueItems":false}},"type":"object"},"api.RelatedAttackPattern":{"description":"api.RelatedAttackPattern","properties":{"capec_id":{"type":"string"},"capec_name":{"type":"string"},"capec_url":{"type":"string"},"lang":{"type":"string"}},"type":"object"},"api.SSVC":{"description":"api.SSVC","properties":{"automatable":{"type":"string"},"exploitation":{"type":"string"},"source":{"type":"string"},"technicalImpact":{"type":"string"}},"type":"object"},"api.TemporalCVSSV2":{"description":"api.TemporalCVSSV2","properties":{"exploitability":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"temporalScore":{"type":"number"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.TemporalCVSSV3":{"description":"api.TemporalCVSSV3","properties":{"exploitCodeMaturity":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"temporalScore":{"type":"number"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.TemporalMetricV2":{"description":"api.TemporalMetricV2","properties":{"cvssV2":{"$ref":"#/components/schemas/api.TemporalCVSSV2"}},"type":"object"},"api.TemporalMetricV3":{"description":"api.TemporalMetricV3","properties":{"cvssV3":{"$ref":"#/components/schemas/api.TemporalCVSSV3"}},"type":"object"},"api.Update":{"description":"api.Update","properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"description":"sort // key","type":"string"},"issued":{"$ref":"#/components/schemas/api.DateTime"},"os_arch":{"type":"string"},"os_version":{"type":"string"},"packages":{"items":{"$ref":"#/components/schemas/api.Package"},"type":"array","uniqueItems":false},"references":{"items":{"$ref":"#/components/schemas/api.Reference"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"},"updated":{"$ref":"#/components/schemas/api.DateTime"}},"type":"object"},"api.VulnCheckCanary":{"description":"api.VulnCheckCanary","properties":{"category":{"type":"string"},"client_fingerprints":{"$ref":"#/components/schemas/api.ClientFingerprints"},"cve":{"type":"string"},"dst_country":{"type":"string"},"http":{"$ref":"#/components/schemas/api.HTTPDetails"},"payload":{"type":"string"},"severity":{"type":"integer"},"signature":{"type":"string"},"signature_id":{"type":"integer"},"src_as_domain":{"type":"string"},"src_as_name":{"type":"string"},"src_asn":{"type":"string"},"src_country":{"type":"string"},"src_ip":{"type":"string"},"src_port":{"type":"integer"},"timestamp":{"type":"string"}},"type":"object"},"api.VulnerabilityAlias":{"description":"api.VulnerabilityAlias","properties":{"alias":{"type":"string"},"cve":{"type":"string"},"reference_url":{"type":"string"}},"type":"object"},"backup.BackupResponse":{"description":"backup.BackupResponse","properties":{"available":{"type":"boolean"},"feed":{"type":"string"},"url":{"type":"string"},"url_direct":{"type":"string"},"url_expires":{"type":"string"}},"type":"object"},"backup.FeedItem":{"description":"backup.FeedItem","properties":{"available":{"type":"boolean"},"backup_written_at":{"type":"string"},"href":{"type":"string"},"name":{"type":"string"}},"type":"object"},"backup.ListBackupsResponse":{"description":"backup.ListBackupsResponse","properties":{"data":{"items":{"$ref":"#/components/schemas/backup.FeedItem"},"type":"array","uniqueItems":false}},"type":"object"},"models.Entitlements":{"description":"models.Entitlements","properties":{"entitlements":{"additionalProperties":{"items":{"type":"string"},"type":"array"},"description":"Entitlements provides a map of roles to a list of entitlements","type":"object"}},"type":"object"},"paginate.Match":{"description":"paginate.Match","properties":{"field":{"type":"string"},"value":{"type":"string"}},"type":"object"},"paginate.Pagination":{"description":"paginate.Pagination","properties":{"cursor":{"description":"Cursor for the current page","type":"string"},"first_item":{"description":"First and last Item","type":"integer"},"index":{"description":"The requested index","type":"string"},"last_item":{"type":"integer"},"limit":{"description":"Per-Page limit","type":"integer"},"matches":{"items":{"$ref":"#/components/schemas/paginate.Match"},"type":"array","uniqueItems":false},"max_pages":{"type":"integer"},"next_cursor":{"description":"Cursor for the next page","type":"string"},"opensearch_query":{"type":"object"},"order":{"type":"string"},"page":{"description":"The current Page number","type":"integer"},"pages":{"items":{"type":"string"},"type":"array","uniqueItems":false},"parameters":{"items":{"$ref":"#/components/schemas/paginate.Param"},"type":"array","uniqueItems":false},"show_pages":{"type":"boolean"},"show_query":{"type":"boolean"},"sort":{"type":"string"},"timestamp":{"type":"string"},"total_documents":{"description":"The total number of items","type":"integer"},"total_pages":{"description":"The total number of pages","type":"integer"},"warnings":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"paginate.Param":{"description":"paginate.Param","properties":{"filtering":{"type":"string"},"format":{"type":"string"},"name":{"type":"string"}},"type":"object"},"params.IndexBackup":{"description":"params.IndexBackup","properties":{"date_added":{"type":"string"},"filename":{"type":"string"},"sha256":{"type":"string"},"url":{"type":"string"},"url_ap-southeast-2":{"type":"string"},"url_eu-west-2":{"type":"string"},"url_expires":{"type":"string"},"url_il-central-1":{"type":"string"},"url_me-central-1":{"type":"string"},"url_mrap":{"type":"string"},"url_ttl_minutes":{"type":"integer"},"url_us-east-1":{"type":"string"},"url_us-west-2":{"type":"string"}},"type":"object"},"params.IndexBackupList":{"description":"params.IndexBackupList","properties":{"description":{"type":"string"},"href":{"description":"Href API endpoint URI to detailed backup information","type":"string"},"name":{"type":"string"}},"type":"object"},"params.IndexList":{"description":"params.IndexList","properties":{"description":{"type":"string"},"href":{"description":"Href API endpoint URI to detailed index information","type":"string"},"name":{"type":"string"}},"type":"object"},"purl.BatchVulnFinding":{"description":"purl.BatchVulnFinding","properties":{"cves":{"description":"list of associated CVE 's","items":{"type":"string"},"type":"array","uniqueItems":false},"purl":{"description":"the purl, ex. hex/coherence@0.1.2","type":"string"},"purl_struct":{"$ref":"#/components/schemas/purl.PackageURLJSON"},"research_attributes":{"$ref":"#/components/schemas/api.OSSPackageResearchAttributes"},"vulnerabilities":{"description":"list of associated vulnerabilities","items":{"$ref":"#/components/schemas/api.OSSPackageVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"purl.PackageURLJSON":{"description":"meta-data about the purl","properties":{"name":{"type":"string"},"namespace":{"type":"string"},"qualifiers":{"items":{"$ref":"#/components/schemas/purl.QualifierJSON"},"type":"array","uniqueItems":false},"subpath":{"type":"string"},"type":{"type":"string"},"version":{"type":"string"}},"type":"object"},"purl.QualifierJSON":{"description":"purl.QualifierJSON","properties":{"key":{"type":"string"},"value":{"type":"string"}},"type":"object"},"purls.Artifact":{"description":"purls.Artifact","type":"object"},"purls.PurlResponse":{"description":"purls.PurlResponse","properties":{"artifacts":{"$ref":"#/components/schemas/purls.Artifact"},"cves":{"items":{"type":"string"},"type":"array","uniqueItems":false},"licenses":{"items":{"type":"string"},"type":"array","uniqueItems":false},"name":{"type":"string"},"published_date":{"type":"string"},"purl":{"items":{"type":"string"},"type":"array","uniqueItems":false},"version":{"type":"string"},"vulnerabilities":{"items":{"$ref":"#/components/schemas/purls.Vulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"purls.Vulnerability":{"description":"purls.Vulnerability","properties":{"arch":{"type":"string"},"detection":{"type":"string"},"fixed_version":{"type":"string"}},"type":"object"},"render.Response-array_params_IndexBackupList":{"description":"render.Response-array_params_IndexBackupList","properties":{"_benchmark":{"type":"number"},"data":{"items":{"$ref":"#/components/schemas/params.IndexBackupList"},"type":"array","uniqueItems":false}},"type":"object"},"render.Response-array_params_IndexList":{"description":"render.Response-array_params_IndexList","properties":{"_benchmark":{"type":"number"},"data":{"items":{"$ref":"#/components/schemas/params.IndexList"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_A10-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_A10-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.A10"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ABBAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ABBAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ABBAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AIX-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AIX-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AIX"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AMD-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AMD-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AMD"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AMI-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AMI-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AMI"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ASRG-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ASRG-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ASRG"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AVEVAAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AVEVAAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AVEVAAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AVIDMLAdvs-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AVIDMLAdvs-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AVIDMLAdvs"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AWS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AWS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AWS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Abbott-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Abbott-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Abbott"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Absolute-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Absolute-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Absolute"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Acronis-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Acronis-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Acronis"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AdobeAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AdobeAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AdobeAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Advantech-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Advantech-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Advantech"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Advisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Advisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Advisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AdvisoryRecord-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AdvisoryRecord-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AdvisoryRecord"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AlephResearch-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AlephResearch-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AlephResearch"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Alibaba-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Alibaba-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Alibaba"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AlmaLinuxUpdate-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AlmaLinuxUpdate-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AlmaLinuxUpdate"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AlpineLinuxSecDB-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AlpineLinuxSecDB-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AlpineLinuxSecDB"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AmazonCVE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AmazonCVE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AmazonCVE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AnchoreNVDOverride-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AnchoreNVDOverride-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AnchoreNVDOverride"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AndroidAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AndroidAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AndroidAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheActiveMQ-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheActiveMQ-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheActiveMQ"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheArchiva-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheArchiva-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheArchiva"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheArrow-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheArrow-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheArrow"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheCamel-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheCamel-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheCamel"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheCommons-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheCommons-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheCommons"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheCouchDB-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheCouchDB-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheCouchDB"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheFlink-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheFlink-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheFlink"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheGuacamole-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheGuacamole-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheGuacamole"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheHTTP-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheHTTP-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheHTTP"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheHadoop-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheHadoop-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheHadoop"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheJSPWiki-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheJSPWiki-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheJSPWiki"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheKafka-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheKafka-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheKafka"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheLoggingServices-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheLoggingServices-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheLoggingServices"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheNiFi-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheNiFi-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheNiFi"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheOFBiz-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheOFBiz-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheOFBiz"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheOpenMeetings-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheOpenMeetings-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheOpenMeetings"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheOpenOffice-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheOpenOffice-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheOpenOffice"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApachePulsar-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApachePulsar-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApachePulsar"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheShiro-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheShiro-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheShiro"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheSpark-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheSpark-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheSpark"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheStruts-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheStruts-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheStruts"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheSubversion-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheSubversion-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheSubversion"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheSuperset-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheSuperset-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheSuperset"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheTomcat-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheTomcat-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheTomcat"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheZooKeeper-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ApacheZooKeeper-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheZooKeeper"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AppCheck-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AppCheck-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AppCheck"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Appgate-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Appgate-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Appgate"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AppleAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AppleAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AppleAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ArchIssue-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ArchIssue-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ArchIssue"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Arista-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Arista-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Arista"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Aruba-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Aruba-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Aruba"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AssetNote-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AssetNote-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AssetNote"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Asterisk-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Asterisk-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Asterisk"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Astra-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Astra-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Astra"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Asus-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Asus-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Asus"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AtlassianAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AtlassianAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AtlassianAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AtlassianVuln-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AtlassianVuln-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AtlassianVuln"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Atredis-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Atredis-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Atredis"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Audiocodes-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Audiocodes-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Audiocodes"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AusCert-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_AusCert-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AusCert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Autodesk-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Autodesk-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Autodesk"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Avaya-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Avaya-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Avaya"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Avigilon-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Avigilon-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Avigilon"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Axis-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Axis-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Axis"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Azul-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Azul-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Azul"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BBraunAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BBraunAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BBraunAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BDUAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BDUAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BDUAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BLS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BLS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BLS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Bandr-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Bandr-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Bandr"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BaxterAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BaxterAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BaxterAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BeckhoffAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BeckhoffAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BeckhoffAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BeckmanCoulter-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BeckmanCoulter-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BeckmanCoulter"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BectonDickinsonAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BectonDickinsonAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BectonDickinsonAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BeldenAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BeldenAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BeldenAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BeyondTrust-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BeyondTrust-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BeyondTrust"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Binarly-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Binarly-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Binarly"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BitDefender-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BitDefender-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BitDefender"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BlackBerry-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BlackBerry-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BlackBerry"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BoschAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BoschAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BoschAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BostonScientificAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_BostonScientificAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BostonScientificAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Botnet-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Botnet-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Botnet"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CACyberCentreAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CACyberCentreAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CACyberCentreAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CBLMariner-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CBLMariner-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CBLMariner"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CERTEUAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CERTEUAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CERTEUAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CESA-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CESA-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CESA"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CISAAlert-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CISAAlert-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CISAAlert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CNNVDEntryJSON-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CNNVDEntryJSON-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CNNVDEntryJSON"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CNVDBulletin-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CNVDBulletin-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CNVDBulletin"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CNVDFlaw-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CNVDFlaw-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CNVDFlaw"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CanvasExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CanvasExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CanvasExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CarestreamAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CarestreamAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CarestreamAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Carrier-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Carrier-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Carrier"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertBE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CertBE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CertBE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertFRAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CertFRAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CertFRAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertIN-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CertIN-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CertIN"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertIRSecurityAlert-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CertIRSecurityAlert-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CertIRSecurityAlert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertSE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CertSE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CertSE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertUA-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CertUA-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CertUA"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ChainGuard-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ChainGuard-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ChainGuard"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CheckPoint-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CheckPoint-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CheckPoint"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Chrome-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Chrome-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Chrome"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Ciena-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Ciena-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Ciena"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CisaCsafAdv-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CisaCsafAdv-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CisaCsafAdv"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CiscoAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CiscoAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CiscoAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CiscoCSAF-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CiscoCSAF-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CiscoCSAF"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CiscoKnownGoodValue-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CiscoKnownGoodValue-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CiscoKnownGoodValue"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CitrixAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CitrixAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CitrixAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ClarotyVulnerability-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ClarotyVulnerability-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ClarotyVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CloudBees-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CloudBees-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CloudBees"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CloudVulnDBAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CloudVulnDBAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CloudVulnDBAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CodesysAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CodesysAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CodesysAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CommVault-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CommVault-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CommVault"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CompassSecurity-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CompassSecurity-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CompassSecurity"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ContainerOS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ContainerOS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ContainerOS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CoreImpactExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CoreImpactExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CoreImpactExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Crestron-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Crestron-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Crestron"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CrowdSec-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_CrowdSec-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CrowdSec"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Curl-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Curl-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Curl"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Cvrf-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Cvrf-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Cvrf"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DFNCert-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_DFNCert-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.DFNCert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DLink-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_DLink-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.DLink"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DNN-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_DNN-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.DNN"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Dahua-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Dahua-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Dahua"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Danfoss-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Danfoss-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Danfoss"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Dassault-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Dassault-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Dassault"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DebianSecurityAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_DebianSecurityAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.DebianSecurityAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Dell-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Dell-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Dell"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DeltaAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_DeltaAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.DeltaAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DistroPackage-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_DistroPackage-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.DistroPackage"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Django-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Django-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Django"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DotCMS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_DotCMS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.DotCMS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DragosAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_DragosAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.DragosAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Draytek-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Draytek-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Draytek"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Drupal-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Drupal-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Drupal"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EOLAlibaba-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_EOLAlibaba-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.EOLAlibaba"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EOLMicrosoft-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_EOLMicrosoft-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.EOLMicrosoft"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EOLReleaseData-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_EOLReleaseData-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.EOLReleaseData"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EUVD-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_EUVD-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.EUVD"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EatonAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_EatonAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.EatonAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Elastic-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Elastic-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Elastic"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Elspec-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Elspec-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Elspec"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EmergingThreatsSnort-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_EmergingThreatsSnort-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.EmergingThreatsSnort"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EmersonAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_EmersonAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.EmersonAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EndOfLife-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_EndOfLife-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.EndOfLife"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Endress-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Endress-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Endress"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ExodusIntel-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ExodusIntel-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ExodusIntel"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ExploitDBExploitv2-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ExploitDBExploitv2-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ExploitDBExploitv2"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_F5-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_F5-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.F5"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FSecure-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_FSecure-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.FSecure"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Fanuc-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Fanuc-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Fanuc"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Fastly-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Fastly-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Fastly"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Festo-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Festo-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Festo"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FileCloud-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_FileCloud-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.FileCloud"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FileZilla-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_FileZilla-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.FileZilla"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FlattSecurity-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_FlattSecurity-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.FlattSecurity"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ForgeRock-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ForgeRock-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ForgeRock"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FortinetAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_FortinetAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.FortinetAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FortinetIPS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_FortinetIPS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.FortinetIPS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Foxit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Foxit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Foxit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Fresenius-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Fresenius-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Fresenius"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GCP-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GCP-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GCP"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GEGas-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GEGas-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GEGas"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GEHealthcareAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GEHealthcareAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GEHealthcareAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GHAdvisoryJSONLean-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GHAdvisoryJSONLean-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GHAdvisoryJSONLean"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GHSA-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GHSA-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GHSA"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GMOCyberSecurity-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GMOCyberSecurity-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GMOCyberSecurity"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Gallagher-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Gallagher-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Gallagher"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Gen-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Gen-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Gen"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GenericEOL-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GenericEOL-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GenericEOL"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Genetec-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Genetec-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Genetec"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Gigabyte-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Gigabyte-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Gigabyte"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GitHubExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GitHubExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GitHubExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GitLabExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GitLabExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GitLabExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GiteeExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GiteeExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GiteeExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GitlabAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GitlabAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GitlabAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Glibc-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Glibc-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Glibc"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GnuTLS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GnuTLS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GnuTLS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GoVulnJSON-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GoVulnJSON-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GoVulnJSON"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Grafana-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Grafana-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Grafana"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GreyNoiseDetection-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_GreyNoiseDetection-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GreyNoiseDetection"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HCL-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HCL-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HCL"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HIKVision-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HIKVision-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HIKVision"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HKCert-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HKCert-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HKCert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HMS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HMS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HMS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HP-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HP-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HP"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HPE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HPE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HPE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Hacktivity-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Hacktivity-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Hacktivity"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HarmonyOS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HarmonyOS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HarmonyOS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HashiCorp-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HashiCorp-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HashiCorp"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HaskellSADBAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HaskellSADBAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HaskellSADBAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HillromAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HillromAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HillromAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Hitachi-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Hitachi-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Hitachi"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HitachiEnergy-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HitachiEnergy-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HitachiEnergy"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Honeywell-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Honeywell-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Honeywell"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Huawei-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Huawei-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Huawei"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HuaweiEulerOS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HuaweiEulerOS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HuaweiEulerOS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HuaweiIPS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_HuaweiIPS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HuaweiIPS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IAVA-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_IAVA-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.IAVA"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IBM-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_IBM-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.IBM"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ITWExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ITWExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ITWExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Idemia-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Idemia-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Idemia"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Igel-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Igel-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Igel"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IncibeAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_IncibeAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.IncibeAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Intel-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Intel-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Intel"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.IpIntelRecord"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IsraeliAlert-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_IsraeliAlert-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.IsraeliAlert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IsraeliVulnerability-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_IsraeliVulnerability-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.IsraeliVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Istio-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Istio-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Istio"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Ivanti-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Ivanti-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Ivanti"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IvantiRSS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_IvantiRSS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.IvantiRSS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JFrog-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_JFrog-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.JFrog"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JNJAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_JNJAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.JNJAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JVN-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_JVN-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.JVN"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JVNAdvisoryItem-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_JVNAdvisoryItem-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.JVNAdvisoryItem"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Jenkins-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Jenkins-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Jenkins"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JetBrains-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_JetBrains-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.JetBrains"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JohnsonControls-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_JohnsonControls-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.JohnsonControls"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Juniper-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Juniper-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Juniper"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_K8S-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_K8S-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.K8S"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_KEVCatalogVulnerability-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_KEVCatalogVulnerability-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.KEVCatalogVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_KRCertAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_KRCertAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.KRCertAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_KasperskyICSCERTAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_KasperskyICSCERTAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.KasperskyICSCERTAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_KoreLogic-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_KoreLogic-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.KoreLogic"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Kunbus-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Kunbus-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Kunbus"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_LG-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_LG-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.LG"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Lantronix-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Lantronix-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Lantronix"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Lenovo-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Lenovo-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Lenovo"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_LexmarkAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_LexmarkAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.LexmarkAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_LibreOffice-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_LibreOffice-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.LibreOffice"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Linux-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Linux-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Linux"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_LolAdvs-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_LolAdvs-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.LolAdvs"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MACert-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MACert-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MACert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MFiles-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MFiles-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MFiles"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MaliciousPackage-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MaliciousPackage-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MaliciousPackage"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MaliciousVSCodeExts-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MaliciousVSCodeExts-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MaliciousVSCodeExts"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ManageEngineAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ManageEngineAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ManageEngineAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MbedTLS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MbedTLS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MbedTLS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_McAfee-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_McAfee-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.McAfee"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Mediatek-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Mediatek-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Mediatek"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MedtronicAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MedtronicAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MedtronicAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Mendix-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Mendix-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Mendix"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MetaAdvisories-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MetaAdvisories-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MetaAdvisories"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MetaData-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MetaData-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MetaData"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MetasploitExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MetasploitExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MetasploitExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MicrosoftCSAF-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MicrosoftCSAF-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MicrosoftCSAF"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MicrosoftCVRF-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MicrosoftCVRF-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MicrosoftCVRF"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MicrosoftDriverBlockList-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MicrosoftDriverBlockList-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MicrosoftDriverBlockList"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MicrosoftKb-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MicrosoftKb-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MicrosoftKb"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Mikrotik-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Mikrotik-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Mikrotik"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Mindray-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Mindray-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Mindray"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MispValue-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MispValue-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MispValue"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Mitel-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Mitel-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Mitel"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MitreCVEListV5-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MitreCVEListV5-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MitreCVEListV5"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MitsubishiElectricAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MitsubishiElectricAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MitsubishiElectricAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MongoDB-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MongoDB-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MongoDB"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MoxaAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MoxaAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MoxaAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MozillaAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_MozillaAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MozillaAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NCSC-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NCSC-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NCSC"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NCSCCVE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NCSCCVE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NCSCCVE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NEC-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NEC-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NEC"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NHS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NHS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NHS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NI-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NI-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NI"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NTP-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NTP-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NTP"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NVD20Source-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NVD20Source-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NVD20Source"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NVDCPEDictionary-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NVDCPEDictionary-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NVDCPEDictionary"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NZAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NZAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NZAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Naver-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Naver-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Naver"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Nessus-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Nessus-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Nessus"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NetApp-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NetApp-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NetApp"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Netatalk-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Netatalk-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Netatalk"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Netgate-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Netgate-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Netgate"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Netgear-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Netgear-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Netgear"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Netskope-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Netskope-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Netskope"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Nexpose-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Nexpose-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Nexpose"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NginxAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NginxAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NginxAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NodeJS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NodeJS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NodeJS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NodeSecurity-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NodeSecurity-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NodeSecurity"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Nokia-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Nokia-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Nokia"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NotePadPlusPlus-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_NotePadPlusPlus-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NotePadPlusPlus"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Nozomi-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Nozomi-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Nozomi"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Nuclei-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Nuclei-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Nuclei"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OSV-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OSV-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OSV"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OTRS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OTRS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OTRS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OctopusDeploy-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OctopusDeploy-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OctopusDeploy"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Okta-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Okta-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Okta"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Omron-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Omron-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Omron"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OneE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OneE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OneE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenBSD-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OpenBSD-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OpenBSD"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenCVDB-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OpenCVDB-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OpenCVDB"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenJDK-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OpenJDK-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OpenJDK"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenSSH-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OpenSSH-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OpenSSH"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenSSLSecAdv-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OpenSSLSecAdv-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OpenSSLSecAdv"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenStack-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OpenStack-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OpenStack"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Opengear-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Opengear-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Opengear"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OracleCPU-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OracleCPU-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OracleCPU"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OracleCPUCSAF-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OracleCPUCSAF-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OracleCPUCSAF"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OwnCloud-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_OwnCloud-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OwnCloud"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PHPMyAdmin-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PHPMyAdmin-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PHPMyAdmin"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PKCert-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PKCert-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PKCert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PTC-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PTC-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PTC"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PacketstormExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PacketstormExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PacketstormExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Palantir-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Palantir-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Palantir"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PaloAltoAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PaloAltoAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PaloAltoAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Panasonic-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Panasonic-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Panasonic"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PaperCut-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PaperCut-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PaperCut"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Pega-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Pega-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Pega"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PhilipsAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PhilipsAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PhilipsAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PhoenixContactAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PhoenixContactAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PhoenixContactAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PostgresSQL-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PostgresSQL-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PostgresSQL"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PowerDNS-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PowerDNS-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PowerDNS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Progress-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Progress-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Progress"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Proofpoint-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Proofpoint-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Proofpoint"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PureStorage-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PureStorage-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PureStorage"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PyPAAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_PyPAAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PyPAAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_QNAPAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_QNAPAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.QNAPAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_QQID-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_QQID-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.QQID"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_QSB-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_QSB-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.QSB"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Qualcomm-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Qualcomm-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Qualcomm"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Qualys-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Qualys-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Qualys"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_QualysQID-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_QualysQID-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.QualysQID"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RansomwareExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_RansomwareExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.RansomwareExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RedLion-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_RedLion-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.RedLion"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RedhatCVE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_RedhatCVE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.RedhatCVE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Renesas-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Renesas-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Renesas"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Revive-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Revive-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Revive"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RhelCVE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_RhelCVE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.RhelCVE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Roche-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Roche-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Roche"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Rockwell-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Rockwell-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Rockwell"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RockyErrata-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_RockyErrata-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.RockyErrata"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Rsync-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Rsync-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Rsync"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Ruckus-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Ruckus-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Ruckus"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RustsecAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_RustsecAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.RustsecAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SAAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SAAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SAAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SAP-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SAP-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SAP"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SECConsult-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SECConsult-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SECConsult"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SSDAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SSDAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SSDAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Safran-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Safran-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Safran"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SaintExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SaintExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SaintExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SalesForce-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SalesForce-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SalesForce"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Samba-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Samba-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Samba"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sandisk-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Sandisk-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Sandisk"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SansDshield-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SansDshield-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SansDshield"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SchneiderElectricAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SchneiderElectricAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SchneiderElectricAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Schutzwerk-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Schutzwerk-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Schutzwerk"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SecurityBulletin-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SecurityBulletin-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SecurityBulletin"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SecurityLab-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SecurityLab-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SecurityLab"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SeebugExploit-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SeebugExploit-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SeebugExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sel-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Sel-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Sel"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SentinelOne-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SentinelOne-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SentinelOne"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ServiceNow-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ServiceNow-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ServiceNow"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SevenZip-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SevenZip-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SevenZip"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ShadowServerExploitedVulnerability-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ShadowServerExploitedVulnerability-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ShadowServerExploitedVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Shielder-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Shielder-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Shielder"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sick-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Sick-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Sick"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SiemensAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SiemensAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SiemensAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SierraWireless-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SierraWireless-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SierraWireless"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SigmaRule-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SigmaRule-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SigmaRule"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SingCert-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SingCert-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SingCert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sitecore-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Sitecore-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Sitecore"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Slackware-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Slackware-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Slackware"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SolarWindsAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SolarWindsAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SolarWindsAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Solr-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Solr-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Solr"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sonatype-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Sonatype-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Sonatype"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SonicWallAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SonicWallAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SonicWallAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SpacelabsHealthcareAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SpacelabsHealthcareAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SpacelabsHealthcareAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Splunk-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Splunk-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Splunk"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Spring-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Spring-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Spring"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Stormshield-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Stormshield-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Stormshield"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_StrykerAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_StrykerAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.StrykerAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sudo-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Sudo-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Sudo"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SuseSecurity-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SuseSecurity-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SuseSecurity"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SwisslogHealthcareAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SwisslogHealthcareAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SwisslogHealthcareAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Symfony-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Symfony-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Symfony"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Synacktiv-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Synacktiv-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Synacktiv"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SyncroSoft-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_SyncroSoft-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SyncroSoft"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Synology-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Synology-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Synology"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Syss-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Syss-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Syss"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TI-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_TI-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TI"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TPLink-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_TPLink-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TPLink"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TWCertAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_TWCertAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TWCertAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Tailscale-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Tailscale-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Tailscale"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TalosAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_TalosAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TalosAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TeamViewer-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_TeamViewer-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TeamViewer"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TenableResearchAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_TenableResearchAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TenableResearchAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Tencent-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Tencent-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Tencent"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Thales-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Thales-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Thales"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TheMissingLink-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_TheMissingLink-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TheMissingLink"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ThermoFisher-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ThermoFisher-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ThermoFisher"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ThreatActorWithExternalObjects-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ThreatActorWithExternalObjects-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ThreatActorWithExternalObjects"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Tibco-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Tibco-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Tibco"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TraneTechnology-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_TraneTechnology-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TraneTechnology"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TrendMicro-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_TrendMicro-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TrendMicro"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Trustwave-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Trustwave-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Trustwave"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_USD-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_USD-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.USD"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_USOMAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_USOMAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.USOMAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Ubiquiti-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Ubiquiti-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Ubiquiti"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_UbuntuCVE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_UbuntuCVE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.UbuntuCVE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Unify-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Unify-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Unify"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Unisoc-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Unisoc-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Unisoc"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Update-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Update-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Update"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VCCPEDictionary-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VCCPEDictionary-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VCCPEDictionary"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VCVulnerableCPEs-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VCVulnerableCPEs-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VCVulnerableCPEs"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VDEAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VDEAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VDEAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VLC-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VLC-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VLC"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VMWareAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VMWareAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VMWareAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VYAIREAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VYAIREAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VYAIREAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VanDyke-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VanDyke-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VanDyke"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VapidLabsAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VapidLabsAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VapidLabsAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Veeam-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Veeam-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Veeam"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Veritas-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Veritas-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Veritas"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Virtuozzo-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Virtuozzo-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Virtuozzo"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VoidSec-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VoidSec-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VoidSec"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VulnCheck-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VulnCheck-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VulnCheck"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VulnCheckCVEListV5-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VulnCheckCVEListV5-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VulnCheckCVEListV5"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VulnCheckConfig-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VulnCheckConfig-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VulnCheckConfig"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VulnCheckKEV-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VulnCheckKEV-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VulnCheckKEV"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VulnerableDebianPackage-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_VulnerableDebianPackage-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VulnerableDebianPackage"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Vulnrichment-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Vulnrichment-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Vulnrichment"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_WRT-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_WRT-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.WRT"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_WatchGuard-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_WatchGuard-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.WatchGuard"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_WhatsApp-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_WhatsApp-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.WhatsApp"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Wibu-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Wibu-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Wibu"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Wireshark-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Wireshark-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Wireshark"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_WithSecure-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_WithSecure-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.WithSecure"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_WolfSSL-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_WolfSSL-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.WolfSSL"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Wolfi-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Wolfi-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Wolfi"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Wordfence-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Wordfence-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Wordfence"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Xen-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Xen-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Xen"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Xerox-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Xerox-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Xerox"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Xiaomi-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Xiaomi-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Xiaomi"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Xylem-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Xylem-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Xylem"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Yamaha-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Yamaha-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Yamaha"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_YokogawaAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_YokogawaAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.YokogawaAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Yubico-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Yubico-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Yubico"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zebra-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Zebra-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Zebra"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ZeroDayAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ZeroDayAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ZeroDayAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ZeroScienceAdvisory-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_ZeroScienceAdvisory-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ZeroScienceAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zimbra-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Zimbra-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Zimbra"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zoom-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Zoom-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Zoom"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zscaler-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Zscaler-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Zscaler"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zuso-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Zuso-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Zuso"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zyxel-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_advisory_Zyxel-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Zyxel"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_CWE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_CWE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.CWE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_CveItems-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_CveItems-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.CveItems"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_CveItemsExtended-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_CveItemsExtended-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.CveItemsExtended"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_EPSSData-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_EPSSData-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.EPSSData"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_ExploitChain-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_ExploitChain-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.ExploitChain"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_ExploitV3Result-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_ExploitV3Result-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.ExploitV3Result"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_ExploitsChangelog-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_ExploitsChangelog-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.ExploitsChangelog"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_InitialAccess-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_InitialAccess-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.InitialAccess"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_MitreAttackToCVE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_MitreAttackToCVE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.MitreAttackToCVE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_NVD20CPEMatch-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_NVD20CPEMatch-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.NVD20CPEMatch"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_NVD20CVE-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_NVD20CVE-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.NVD20CVE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_NVD20CVEExtended-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_NVD20CVEExtended-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.NVD20CVEExtended"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.OSSPackage"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_Update-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_Update-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.Update"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.VulnCheckCanary"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_VulnerabilityAlias-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_api_VulnerabilityAlias-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.VulnerabilityAlias"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination":{"description":"render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/purls.PurlResponse"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_string-v3controllers_ResponseMetadata":{"description":"render.ResponseWithMetadata-array_string-v3controllers_ResponseMetadata","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/v3controllers.ResponseMetadata"},"data":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-v3controllers_BackupResponseData-v3controllers_BackupResponseMetadata":{"description":"render.ResponseWithMetadata-v3controllers_BackupResponseData-v3controllers_BackupResponseMetadata","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/v3controllers.BackupResponseMetadata"},"data":{"items":{"$ref":"#/components/schemas/params.IndexBackup"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-v3controllers_PurlResponseData-v3controllers_PurlResponseMetadata":{"description":"render.ResponseWithMetadata-v3controllers_PurlResponseData-v3controllers_PurlResponseMetadata","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/v3controllers.PurlResponseMetadata"},"data":{"$ref":"#/components/schemas/v3controllers.PurlResponseData"}},"type":"object"},"render.ResponseWithMetadata-v3controllers_PurlsResponseData-v3controllers_PurlsResponseMetadata":{"description":"render.ResponseWithMetadata-v3controllers_PurlsResponseData-v3controllers_PurlsResponseMetadata","properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/v3controllers.PurlsResponseMetadata"},"data":{"items":{"$ref":"#/components/schemas/purl.BatchVulnFinding"},"type":"array","uniqueItems":false}},"type":"object"},"search.ErrorResponse":{"description":"search.ErrorResponse","properties":{"error":{"type":"boolean"},"errors":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"search.V4AdvisoryMeta":{"description":"search.V4AdvisoryMeta","properties":{"cursor":{"type":"string"},"filtered":{"type":"integer"},"limit":{"type":"integer"},"next_cursor":{"type":"string"},"page":{"type":"integer"},"pages":{"type":"integer"},"total":{"type":"integer"}},"type":"object"},"search.V4AdvisoryReturnValue":{"description":"search.V4AdvisoryReturnValue","properties":{"_meta":{"$ref":"#/components/schemas/search.V4AdvisoryMeta"},"data":{"items":{"$ref":"#/components/schemas/advisory.MitreCVEListV5Ref"},"type":"array","uniqueItems":false}},"type":"object"},"search.V4FeedItem":{"description":"search.V4FeedItem","properties":{"description":{"type":"string"},"href":{"type":"string"},"name":{"type":"string"}},"type":"object"},"search.V4ListFeedReturnValue":{"description":"search.V4ListFeedReturnValue","properties":{"data":{"items":{"$ref":"#/components/schemas/search.V4FeedItem"},"type":"array","uniqueItems":false}},"type":"object"},"v3controllers.BackupResponseMetadata":{"description":"v3controllers.BackupResponseMetadata","properties":{"index":{"type":"string"},"timestamp":{"type":"string"}},"type":"object"},"v3controllers.PurlResponseData":{"description":"v3controllers.PurlResponseData","properties":{"cves":{"description":"list of associated CVE 's","items":{"type":"string"},"type":"array","uniqueItems":false},"vulnerabilities":{"description":"list of associated vulnerabilities","items":{"$ref":"#/components/schemas/api.OSSPackageVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"v3controllers.PurlResponseMetadata":{"description":"v3controllers.PurlResponseMetadata","properties":{"purl_struct":{"$ref":"#/components/schemas/purl.PackageURLJSON"},"timestamp":{"description":"time of the transaction","type":"string"},"total_documents":{"description":"number of results found","type":"integer"}},"type":"object"},"v3controllers.PurlsResponseMetadata":{"description":"v3controllers.PurlsResponseMetadata","properties":{"timestamp":{"description":"time of the transaction","type":"string"},"total_documents":{"description":"number of results found","type":"integer"}},"type":"object"},"v3controllers.ResponseMetadata":{"description":"v3controllers.ResponseMetadata","properties":{"cpe":{"type":"string"},"cpe_struct":{"$ref":"#/components/schemas/api.CPE"},"timestamp":{"type":"string"},"total_documents":{"type":"integer"}},"type":"object"}},"securitySchemes":{"Bearer":{"in":"header","name":"Authorization","type":"apiKey"}}},"externalDocs":{"description":"","url":""},"info":{"contact":{"email":"support@vulncheck.com","name":"VulnCheck API Support"},"description":"VulnCheck API (v3 + v4)","termsOfService":"https://vulncheck.com/terms","title":"VulnCheck API","version":"latest"},"openapi":"3.1.0","paths":{"/v3/backup":{"get":{"description":"Return a list of indexes with backup and endpoint links that the user has access to","operationId":"backup_get","responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.Response-array_params_IndexBackupList"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"oneOf":[{"type":"string"},{"type":"string"}]}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return a list of indexes with backup and endpoint links","tags":["endpoints"]}},"/v3/backup/{index}":{"get":{"description":"Retrieve a list of VulnCheck backups by index","operationId":"backup_index_get","parameters":[{"description":"Name of an exploit, vulnerability, or advisory index","in":"path","name":"index","required":true,"schema":{"enum":["7zip","a10","abb","abbott","absolute","acronis","adobe","advantech","advisories","aix","aleph-research","alibaba-advs","alma","alpine","alpine-purls","amazon","amazon-cve","amd","ami","anchore-nvd-override","android","apache-activemq","apache-archiva","apache-arrow","apache-camel","apache-commons","apache-couchdb","apache-flink","apache-guacamole","apache-hadoop","apache-http","apache-jspwiki","apache-kafka","apache-loggingservices","apache-nifi","apache-ofbiz","apache-openmeetings","apache-openoffice","apache-pulsar","apache-shiro","apache-spark","apache-struts","apache-subversion","apache-superset","apache-tomcat","apache-zookeeper","appcheck","appgate","apple","arch","arista","aruba","asrg","assetnote","asterisk","astra","asus","atlassian","atlassian-vulns","atredis","audiocodes","auscert","autodesk","avaya","aveva","avidml-advs","avigilon","aws","axis","azul","bandr","baxter","bbraun","bd","bdu","beckhoff","beckman-coulter","belden","beyond-trust","binarly","bitdefender","blackberry","bls","bosch","boston-scientific","botnets","ca-cyber-centre","canvas","carestream","cargo","carrier","cbl-mariner","centos","cert-be","cert-in","cert-ir-security-alerts","cert-se","cert-ua","certeu","certfr","chainguard","checkpoint","chrome","ciena","cisa-alerts","cisa-csaf","cisa-kev","cisco","cisco-csaf","cisco-known-good-values","cisco-talos","citrix","claroty","cloudbees","cloudvulndb","cnnvd","cnvd-bulletins","cnvd-flaws","cocoapods","codesys","commvault","compass-security","composer","conan","coreimpact","cpe-vulnerable","crestron","crowdsec","curl","cwe","dahua","danfoss","dassault","debian","debian-dsa","debian-packages","debian-purls","dell","delta","dfn-cert","django","dlink","dnn","dotcms","dragos","draytek","drupal","eaton","elastic","elspec","emerging-threats-snort","emerson","endoflife","endress","eol","eol-alibaba","eol-microsoft","epss","euvd","exodus-intel","exploit-chains","exploitdb","exploits","exploits-changelog","f-secure","f5","fanuc","fastly","fedora","festo","filecloud","filezilla","flatt-security","forgerock","fortinet","fortinet-ips","foxit","freebsd","fresenius","gallagher","gcp","ge-gas","ge-healthcare","gem","gen","genetec","ghsa","gigabyte","gitee-exploits","github-exploits","github-security-advisories","gitlab-advisories-community","gitlab-exploits","glibc","gmo-cybersecurity","gnutls","go-vulndb","golang","google-0day-itw","google-container-optimized-os","grafana","greynoise-metadata","hackage","hacktivity","harmonyos","hashicorp","haskell-sadb","hcl","hex","hikvision","hillrom","hitachi","hitachi-energy","hkcert","hms","honeywell","hp","hp-eol","hpe","hpe-eol","huawei-euleros","huawei-ips","huawei-psirt","iava","ibm","idemia","igel","il-alerts","il-vulnerabilities","incibe","initial-access","initial-access-git","intel","ipintel-10d","ipintel-30d","ipintel-3d","ipintel-90d","istio","ivanti","ivanti-rss","jenkins","jetbrains","jfrog","jnj","johnson-controls","juniper","jvn","jvndb","kaspersky-ics-cert","korelogic","krcert-security-notices","krcert-vulnerabilities","kubernetes","kunbus","lantronix","lenovo","lexmark","lg","libre-office","linux","lol-advs","m-files","macert","malicious-packages","malicious-vscode-exts","manageengine","maven","mbed-tls","mcafee","mediatek","medtronic","mendix","meta-advisories","metasploit","microsoft-csaf","microsoft-cvrf","microsoft-driver-block-list","microsoft-kb","mikrotik","mindray","misp-threat-actors","mitel","mitre-attack-cve","mitre-cvelist-v5","mitsubishi-electric","mongodb","moxa","mozilla","naver","ncsc","ncsc-cves","nec","nessus","netapp","netatalk","netgate","netgear","netskope","nexpose","nginx","nhs","ni","nist-nvd","nist-nvd2","nist-nvd2-cpematch","nist-nvd2-sources","node-security","nodejs","nokia","notepadplusplus","nozomi","npm","ntp","nuclei","nuget","nvd-cpe-dictionary","nvidia","nz-advisories","octopus-deploy","okta","omron","omron-eol","one-e","opam","open-cvdb","openbsd","opengear","openjdk","openssh","openssl-secadv","openstack","openwrt","oracle","oracle-cpu","oracle-cpu-csaf","osv","otrs","owncloud","packetstorm","palantir","palo-alto","panasonic","papercut","pega","philips","phoenix-contact","php-my-admin","pkcert","postgressql","powerdns","progress","proofpoint","ptc","pub","pure-storage","pypa-advisories","pypi","qnap","qqids","qualcomm","qualys","qualys-qids","qubes-qsb","ransomware","red-lion","redhat","redhat-cves","renesas","revive","roche","rockwell","rocky","rocky-errata","rocky-purls","rsync","ruckus","rustsec-advisories","sacert","safran","saint","salesforce","samba","sandisk","sans-dshield","sap","schneider-electric","schutzwerk","sec-consult","securitylab","seebug","sel","sentinelone","servicenow","shadowserver-exploited","shielder","sick","siemens","sierra-wireless","sigmahq-sigma-rules","singcert","sitecore","slackware","solarwinds","solr","sonatype","sonicwall","spacelabs-healthcare","splunk","spring","ssd","stormshield","stryker","sudo","suse","suse-security","swift","swisslog-healthcare","symfony","synacktiv","syncrosoft","synology","syss","tailscale","teamviewer","tenable-research-advisories","tencent","thales","themissinglink","thermo-fisher","threat-actors","ti","tibco","tp-link","trane-technology","trendmicro","trustwave","twcert","ubiquiti","ubuntu","ubuntu-purls","unify","unisoc","usd","usom","vandyke","vapidlabs","vc-cpe-dictionary","vde","veeam","veritas","virtuozzo","vlc","vmware","voidsec","vulncheck","vulncheck-canaries","vulncheck-canaries-10d","vulncheck-canaries-30d","vulncheck-canaries-3d","vulncheck-canaries-90d","vulncheck-config","vulncheck-cvelist-v5","vulncheck-kev","vulncheck-nvd","vulncheck-nvd2","vulnerability-aliases","vulnrichment","vyaire","watchguard","whatsapp","wibu","wireshark","with-secure","wolfi","wolfssl","wordfence","xen","xerox","xiaomi","xylem","yamaha","yokogawa","yubico","zdi","zebra","zebra-eol","zeroscience","zimbra","zoom","zscaler","zuso","zyxel"],"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-v3controllers_BackupResponseData-v3controllers_BackupResponseMetadata"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Retrieve a list of backups by index","tags":["endpoints"]}},"/v3/cpe":{"get":{"description":"Based on the specified CPE (Common Platform Enumeration) URI string, this endpoint will return a list of vulnerabilities that are related to the package. We support v2.2 and v2.3","operationId":"cpe_get","parameters":[{"description":"CPE designation to lookup","in":"query","name":"cpe","required":true,"schema":{"type":"string"}},{"description":"Filter by vulnerability status (true/false). Defaults to false if not provided.","in":"query","name":"isVulnerable","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_string-v3controllers_ResponseMetadata"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return CVE 's associated with a specific NIST CPE","tags":["endpoints"]}},"/v3/entitlements":{"get":{"description":"Retrieve entitlements for the current user","operationId":"entitlements_get","responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/models.Entitlements"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Retrieve user entitlements","tags":["endpoints"]}},"/v3/index":{"get":{"description":"Return a list of available indexes with endpoint links that the user has access to","operationId":"index_get","responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.Response-array_params_IndexList"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"oneOf":[{"type":"string"},{"type":"string"}]}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return a list of available indexes with endpoint links","tags":["endpoints"]}},"/v3/index/7zip":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the 7zip index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 7Zip Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/7zip?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/7zip?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_7zip_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SevenZip-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"7zip\"","tags":["indices"]}},"/v3/index/a10":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the a10 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** A10 Networks Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/a10?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/a10?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_a10_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_A10-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"a10\"","tags":["indices"]}},"/v3/index/abb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the abb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ABB Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/abb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/abb?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_abb_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ABBAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"abb\"","tags":["indices"]}},"/v3/index/abbott":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the abbott index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Abbott Product Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/abbott?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/abbott?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_abbott_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Abbott-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"abbott\"","tags":["indices"]}},"/v3/index/absolute":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the absolute index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Absolute Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/absolute?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/absolute?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_absolute_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Absolute-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"absolute\"","tags":["indices"]}},"/v3/index/acronis":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the acronis index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Acronis Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/acronis?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/acronis?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_acronis_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Acronis-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"acronis\"","tags":["indices"]}},"/v3/index/adobe":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the adobe index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Adobe Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/adobe?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/adobe?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_adobe_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AdobeAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"adobe\"","tags":["indices"]}},"/v3/index/advantech":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the advantech index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Advantech Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/advantech?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/advantech?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_advantech_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Advantech-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"advantech\"","tags":["indices"]}},"/v3/index/advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/advisories?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_advisories_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AdvisoryRecord-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"advisories\"","tags":["indices"]}},"/v3/index/aix":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the aix index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AIX Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/aix?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/aix?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_aix_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AIX-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"aix\"","tags":["indices"]}},"/v3/index/aleph-research":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the aleph-research index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Aleph Research Vulnerability Reports\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/aleph-research?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/aleph-research?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_aleph-research_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AlephResearch-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"aleph-research\"","tags":["indices"]}},"/v3/index/alibaba-advs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the alibaba-advs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Alibaba Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/alibaba-advs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/alibaba-advs?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_alibaba-advs_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Alibaba-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"alibaba-advs\"","tags":["indices"]}},"/v3/index/alma":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the alma index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Alma Linux Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/alma?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/alma?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_alma_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AlmaLinuxUpdate-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"alma\"","tags":["indices"]}},"/v3/index/alpine":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the alpine index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Alpine Linux Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/alpine?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/alpine?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_alpine_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AlpineLinuxSecDB-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"alpine\"","tags":["indices"]}},"/v3/index/alpine-purls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the alpine-purls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Alpine Purls\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/alpine-purls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/alpine-purls?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_alpine-purls_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"alpine-purls\"","tags":["indices"]}},"/v3/index/amazon":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the amazon index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Amazon Linux Security Center\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/amazon?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/amazon?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_amazon_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Update-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"amazon\"","tags":["indices"]}},"/v3/index/amazon-cve":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the amazon-cve index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Amazon CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/amazon-cve?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/amazon-cve?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_amazon-cve_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AmazonCVE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"amazon-cve\"","tags":["indices"]}},"/v3/index/amd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the amd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AMD Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/amd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/amd?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_amd_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AMD-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"amd\"","tags":["indices"]}},"/v3/index/ami":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ami index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AMI Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ami?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ami?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ami_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AMI-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ami\"","tags":["indices"]}},"/v3/index/anchore-nvd-override":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the anchore-nvd-override index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Anchore NVD Data Overrides\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/anchore-nvd-override?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/anchore-nvd-override?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_anchore-nvd-override_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AnchoreNVDOverride-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"anchore-nvd-override\"","tags":["indices"]}},"/v3/index/android":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the android index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Android Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/android?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/android?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_android_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AndroidAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"android\"","tags":["indices"]}},"/v3/index/apache-activemq":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-activemq index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache ActiveMQ Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-activemq?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-activemq?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-activemq_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheActiveMQ-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-activemq\"","tags":["indices"]}},"/v3/index/apache-archiva":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-archiva index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Archiva Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-archiva?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-archiva?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-archiva_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheArchiva-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-archiva\"","tags":["indices"]}},"/v3/index/apache-arrow":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-arrow index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Arrow Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-arrow?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-arrow?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-arrow_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheArrow-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-arrow\"","tags":["indices"]}},"/v3/index/apache-camel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-camel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Camel Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-camel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-camel?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-camel_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheCamel-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-camel\"","tags":["indices"]}},"/v3/index/apache-commons":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-commons index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Commons Known Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-commons?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-commons?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-commons_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheCommons-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-commons\"","tags":["indices"]}},"/v3/index/apache-couchdb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-couchdb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache CouchDB Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-couchdb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-couchdb?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-couchdb_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheCouchDB-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-couchdb\"","tags":["indices"]}},"/v3/index/apache-flink":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-flink index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Flink Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-flink?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-flink?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-flink_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheFlink-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-flink\"","tags":["indices"]}},"/v3/index/apache-guacamole":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-guacamole index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Guacamole Security Reports\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-guacamole?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-guacamole?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-guacamole_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheGuacamole-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-guacamole\"","tags":["indices"]}},"/v3/index/apache-hadoop":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-hadoop index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Hadoop CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-hadoop?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-hadoop?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-hadoop_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheHadoop-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-hadoop\"","tags":["indices"]}},"/v3/index/apache-http":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-http index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache HTTP Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-http?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-http?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-http_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheHTTP-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-http\"","tags":["indices"]}},"/v3/index/apache-jspwiki":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-jspwiki index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache JSPWiki CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-jspwiki?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-jspwiki?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-jspwiki_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheJSPWiki-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-jspwiki\"","tags":["indices"]}},"/v3/index/apache-kafka":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-kafka index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Kafka Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-kafka?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-kafka?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-kafka_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheKafka-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-kafka\"","tags":["indices"]}},"/v3/index/apache-loggingservices":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-loggingservices index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Logging Services Known Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-loggingservices?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-loggingservices?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-loggingservices_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheLoggingServices-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-loggingservices\"","tags":["indices"]}},"/v3/index/apache-nifi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-nifi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache NiFi Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-nifi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-nifi?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-nifi_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheNiFi-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-nifi\"","tags":["indices"]}},"/v3/index/apache-ofbiz":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-ofbiz index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache OFBiz Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-ofbiz?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-ofbiz?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-ofbiz_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheOFBiz-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-ofbiz\"","tags":["indices"]}},"/v3/index/apache-openmeetings":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-openmeetings index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache OpenMeetings Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-openmeetings?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-openmeetings?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-openmeetings_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheOpenMeetings-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-openmeetings\"","tags":["indices"]}},"/v3/index/apache-openoffice":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-openoffice index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache OpenOffice Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-openoffice?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-openoffice?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-openoffice_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheOpenOffice-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-openoffice\"","tags":["indices"]}},"/v3/index/apache-pulsar":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-pulsar index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Pulsar Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-pulsar?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-pulsar?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-pulsar_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApachePulsar-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-pulsar\"","tags":["indices"]}},"/v3/index/apache-shiro":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-shiro index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Shiro Vulnerability Reports\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-shiro?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-shiro?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-shiro_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheShiro-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-shiro\"","tags":["indices"]}},"/v3/index/apache-spark":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-spark index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Spark Known Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-spark?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-spark?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-spark_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheSpark-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-spark\"","tags":["indices"]}},"/v3/index/apache-struts":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-struts index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Struts Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-struts?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-struts?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-struts_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheStruts-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-struts\"","tags":["indices"]}},"/v3/index/apache-subversion":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-subversion index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Subversion Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-subversion?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-subversion?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-subversion_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheSubversion-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-subversion\"","tags":["indices"]}},"/v3/index/apache-superset":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-superset index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Superset CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-superset?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-superset?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-superset_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheSuperset-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-superset\"","tags":["indices"]}},"/v3/index/apache-tomcat":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-tomcat index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Tomcat Security Vunlnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-tomcat?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-tomcat?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-tomcat_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheTomcat-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-tomcat\"","tags":["indices"]}},"/v3/index/apache-zookeeper":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-zookeeper index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache ZooKeeper Vulnerability Reports\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-zookeeper?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-zookeeper?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apache-zookeeper_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheZooKeeper-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apache-zookeeper\"","tags":["indices"]}},"/v3/index/appcheck":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the appcheck index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AppCheck Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/appcheck?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/appcheck?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_appcheck_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AppCheck-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"appcheck\"","tags":["indices"]}},"/v3/index/appgate":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the appgate index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Appgate SDP Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/appgate?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/appgate?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_appgate_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Appgate-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"appgate\"","tags":["indices"]}},"/v3/index/apple":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apple index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apple Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apple?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apple?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_apple_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AppleAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"apple\"","tags":["indices"]}},"/v3/index/arch":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the arch index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Arch Linux\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/arch?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/arch?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_arch_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ArchIssue-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"arch\"","tags":["indices"]}},"/v3/index/arista":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the arista index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Arista Networks Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/arista?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/arista?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_arista_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Arista-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"arista\"","tags":["indices"]}},"/v3/index/aruba":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the aruba index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Aruba Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/aruba?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/aruba?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_aruba_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Aruba-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"aruba\"","tags":["indices"]}},"/v3/index/asrg":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the asrg index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ASRG Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/asrg?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/asrg?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_asrg_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ASRG-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"asrg\"","tags":["indices"]}},"/v3/index/assetnote":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the assetnote index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AssetNote Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/assetnote?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/assetnote?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_assetnote_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AssetNote-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"assetnote\"","tags":["indices"]}},"/v3/index/asterisk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the asterisk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Asterisk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/asterisk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/asterisk?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_asterisk_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Asterisk-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"asterisk\"","tags":["indices"]}},"/v3/index/astra":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the astra index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Astra Linux Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/astra?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/astra?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_astra_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Astra-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"astra\"","tags":["indices"]}},"/v3/index/asus":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the asus index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ASUSTek Computer Inc.\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/asus?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/asus?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_asus_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Asus-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"asus\"","tags":["indices"]}},"/v3/index/atlassian":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the atlassian index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Atlassian Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/atlassian?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/atlassian?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_atlassian_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AtlassianAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"atlassian\"","tags":["indices"]}},"/v3/index/atlassian-vulns":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the atlassian-vulns index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Atlassian Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/atlassian-vulns?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/atlassian-vulns?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_atlassian-vulns_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AtlassianVuln-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"atlassian-vulns\"","tags":["indices"]}},"/v3/index/atredis":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the atredis index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Atredis Partners Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/atredis?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/atredis?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_atredis_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Atredis-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"atredis\"","tags":["indices"]}},"/v3/index/audiocodes":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the audiocodes index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AudioCodes Product Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/audiocodes?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/audiocodes?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_audiocodes_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Audiocodes-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"audiocodes\"","tags":["indices"]}},"/v3/index/auscert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the auscert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AusCERT Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/auscert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/auscert?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_auscert_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AusCert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"auscert\"","tags":["indices"]}},"/v3/index/autodesk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the autodesk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Autodesk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/autodesk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/autodesk?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_autodesk_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Autodesk-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"autodesk\"","tags":["indices"]}},"/v3/index/avaya":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the avaya index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Avaya Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/avaya?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/avaya?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_avaya_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Avaya-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"avaya\"","tags":["indices"]}},"/v3/index/aveva":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the aveva index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AVEVA Group Limited\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/aveva?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/aveva?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_aveva_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AVEVAAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"aveva\"","tags":["indices"]}},"/v3/index/avidml-advs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the avidml-advs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AI Vulnerability Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/avidml-advs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/avidml-advs?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_avidml-advs_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AVIDMLAdvs-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"avidml-advs\"","tags":["indices"]}},"/v3/index/avigilon":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the avigilon index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Avigilon Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/avigilon?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/avigilon?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_avigilon_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Avigilon-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"avigilon\"","tags":["indices"]}},"/v3/index/aws":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the aws index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AWS Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/aws?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/aws?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_aws_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AWS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"aws\"","tags":["indices"]}},"/v3/index/axis":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the axis index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Axis OS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/axis?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/axis?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_axis_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Axis-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"axis\"","tags":["indices"]}},"/v3/index/azul":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the azul index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Azul Common Vulnerabilities and Exposures\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/azul?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/azul?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_azul_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Azul-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"azul\"","tags":["indices"]}},"/v3/index/bandr":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bandr index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** B\u0026R Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bandr?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bandr?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_bandr_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Bandr-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"bandr\"","tags":["indices"]}},"/v3/index/baxter":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the baxter index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Baxter Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/baxter?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/baxter?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_baxter_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BaxterAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"baxter\"","tags":["indices"]}},"/v3/index/bbraun":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bbraun index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** B. Braun Medical Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bbraun?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bbraun?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_bbraun_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BBraunAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"bbraun\"","tags":["indices"]}},"/v3/index/bd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Becton Dickinson Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bd?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_bd_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BectonDickinsonAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"bd\"","tags":["indices"]}},"/v3/index/bdu":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bdu index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** BDU Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bdu?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bdu?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_bdu_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BDUAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"bdu\"","tags":["indices"]}},"/v3/index/beckhoff":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the beckhoff index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Beckhoff Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/beckhoff?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/beckhoff?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_beckhoff_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BeckhoffAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"beckhoff\"","tags":["indices"]}},"/v3/index/beckman-coulter":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the beckman-coulter index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Beckman Coulter Product Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/beckman-coulter?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/beckman-coulter?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_beckman-coulter_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BeckmanCoulter-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"beckman-coulter\"","tags":["indices"]}},"/v3/index/belden":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the belden index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Belden Security Bulletins Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/belden?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/belden?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_belden_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BeldenAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"belden\"","tags":["indices"]}},"/v3/index/beyond-trust":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the beyond-trust index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Beyond Trust Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/beyond-trust?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/beyond-trust?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_beyond-trust_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BeyondTrust-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"beyond-trust\"","tags":["indices"]}},"/v3/index/binarly":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the binarly index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Binarly Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/binarly?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/binarly?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_binarly_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Binarly-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"binarly\"","tags":["indices"]}},"/v3/index/bitdefender":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bitdefender index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Bitdefender Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bitdefender?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bitdefender?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_bitdefender_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BitDefender-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"bitdefender\"","tags":["indices"]}},"/v3/index/blackberry":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the blackberry index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** BlackBerry Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/blackberry?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/blackberry?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_blackberry_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BlackBerry-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"blackberry\"","tags":["indices"]}},"/v3/index/bls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Black Lantern Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bls?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_bls_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BLS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"bls\"","tags":["indices"]}},"/v3/index/bosch":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bosch index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Bosch Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bosch?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bosch?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_bosch_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BoschAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"bosch\"","tags":["indices"]}},"/v3/index/boston-scientific":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the boston-scientific index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Boston Scientific Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/boston-scientific?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/boston-scientific?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_boston-scientific_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BostonScientificAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"boston-scientific\"","tags":["indices"]}},"/v3/index/botnets":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the botnets index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Botnets\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/botnets?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/botnets?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_botnets_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Botnet-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"botnets\"","tags":["indices"]}},"/v3/index/ca-cyber-centre":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ca-cyber-centre index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Canadian Centre for Cyber Security Alerts and Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ca-cyber-centre?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ca-cyber-centre?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ca-cyber-centre_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CACyberCentreAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ca-cyber-centre\"","tags":["indices"]}},"/v3/index/canvas":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the canvas index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CANVAS Exploit Packs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/canvas?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/canvas?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_canvas_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CanvasExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"canvas\"","tags":["indices"]}},"/v3/index/carestream":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the carestream index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Carestream Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/carestream?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/carestream?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_carestream_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CarestreamAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"carestream\"","tags":["indices"]}},"/v3/index/cargo":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cargo index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cargo (Rust) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cargo?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cargo?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cargo_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cargo\"","tags":["indices"]}},"/v3/index/carrier":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the carrier index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Carrier Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/carrier?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/carrier?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_carrier_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Carrier-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"carrier\"","tags":["indices"]}},"/v3/index/cbl-mariner":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cbl-mariner index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CBL-Mariner Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cbl-mariner?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cbl-mariner?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cbl-mariner_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CBLMariner-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cbl-mariner\"","tags":["indices"]}},"/v3/index/centos":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the centos index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CentOS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/centos?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/centos?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_centos_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CESA-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"centos\"","tags":["indices"]}},"/v3/index/cert-be":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cert-be index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cert BE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cert-be?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cert-be?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cert-be_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CertBE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cert-be\"","tags":["indices"]}},"/v3/index/cert-in":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cert-in index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CERT IN Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cert-in?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cert-in?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cert-in_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CertIN-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cert-in\"","tags":["indices"]}},"/v3/index/cert-ir-security-alerts":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cert-ir-security-alerts index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cert IR Security Warnings\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cert-ir-security-alerts?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cert-ir-security-alerts?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cert-ir-security-alerts_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CertIRSecurityAlert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cert-ir-security-alerts\"","tags":["indices"]}},"/v3/index/cert-se":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cert-se index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cert SE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cert-se?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cert-se?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cert-se_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CertSE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cert-se\"","tags":["indices"]}},"/v3/index/cert-ua":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cert-ua index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cert UA Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cert-ua?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cert-ua?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cert-ua_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CertUA-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cert-ua\"","tags":["indices"]}},"/v3/index/certeu":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the certeu index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CERT-EU The Computer Emergency Response Team for the EU Institutions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/certeu?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/certeu?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_certeu_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CERTEUAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"certeu\"","tags":["indices"]}},"/v3/index/certfr":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the certfr index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cert FR Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/certfr?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/certfr?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_certfr_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CertFRAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"certfr\"","tags":["indices"]}},"/v3/index/chainguard":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the chainguard index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ChainGuard Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/chainguard?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/chainguard?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_chainguard_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ChainGuard-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"chainguard\"","tags":["indices"]}},"/v3/index/checkpoint":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the checkpoint index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CheckPoint Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/checkpoint?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/checkpoint?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_checkpoint_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CheckPoint-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"checkpoint\"","tags":["indices"]}},"/v3/index/chrome":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the chrome index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Google Chrome Release Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/chrome?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/chrome?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_chrome_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Chrome-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"chrome\"","tags":["indices"]}},"/v3/index/ciena":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ciena index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ciena\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ciena?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ciena?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ciena_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Ciena-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ciena\"","tags":["indices"]}},"/v3/index/cisa-alerts":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisa-alerts index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CISA Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisa-alerts?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisa-alerts?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cisa-alerts_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CISAAlert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cisa-alerts\"","tags":["indices"]}},"/v3/index/cisa-csaf":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisa-csaf index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CISA Security Advisories - CSAF\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisa-csaf?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisa-csaf?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cisa-csaf_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CisaCsafAdv-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cisa-csaf\"","tags":["indices"]}},"/v3/index/cisa-kev":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisa-kev index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CISA KEV (Known Exploited Vulnerabilities)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisa-kev?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisa-kev?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cisa-kev_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_KEVCatalogVulnerability-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cisa-kev\"","tags":["indices"]}},"/v3/index/cisco":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisco index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cisco Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisco?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisco?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cisco_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CiscoAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cisco\"","tags":["indices"]}},"/v3/index/cisco-csaf":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisco-csaf index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cisco CSAF\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisco-csaf?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisco-csaf?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cisco-csaf_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CiscoCSAF-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cisco-csaf\"","tags":["indices"]}},"/v3/index/cisco-known-good-values":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisco-known-good-values index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cisco Known Good Values\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisco-known-good-values?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisco-known-good-values?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cisco-known-good-values_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CiscoKnownGoodValue-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cisco-known-good-values\"","tags":["indices"]}},"/v3/index/cisco-talos":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisco-talos index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cisco Talos Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisco-talos?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisco-talos?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cisco-talos_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TalosAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cisco-talos\"","tags":["indices"]}},"/v3/index/citrix":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the citrix index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Citrix Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/citrix?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/citrix?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_citrix_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CitrixAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"citrix\"","tags":["indices"]}},"/v3/index/claroty":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the claroty index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Team 82: The Claroty Research Team\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/claroty?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/claroty?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_claroty_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ClarotyVulnerability-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"claroty\"","tags":["indices"]}},"/v3/index/cloudbees":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cloudbees index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CloudBees Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cloudbees?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cloudbees?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cloudbees_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CloudBees-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cloudbees\"","tags":["indices"]}},"/v3/index/cloudvulndb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cloudvulndb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CloudVulnDB\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cloudvulndb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cloudvulndb?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cloudvulndb_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CloudVulnDBAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cloudvulndb\"","tags":["indices"]}},"/v3/index/cnnvd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cnnvd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** The Chinese National Vulnerability Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cnnvd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cnnvd?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cnnvd_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CNNVDEntryJSON-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cnnvd\"","tags":["indices"]}},"/v3/index/cnvd-bulletins":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cnvd-bulletins index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CNVD Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cnvd-bulletins?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cnvd-bulletins?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cnvd-bulletins_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CNVDBulletin-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cnvd-bulletins\"","tags":["indices"]}},"/v3/index/cnvd-flaws":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cnvd-flaws index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CNVD Flaws\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cnvd-flaws?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cnvd-flaws?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cnvd-flaws_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CNVDFlaw-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cnvd-flaws\"","tags":["indices"]}},"/v3/index/cocoapods":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cocoapods index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CocoaPods packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cocoapods?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cocoapods?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cocoapods_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cocoapods\"","tags":["indices"]}},"/v3/index/codesys":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the codesys index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Codesys Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/codesys?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/codesys?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_codesys_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CodesysAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"codesys\"","tags":["indices"]}},"/v3/index/commvault":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the commvault index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Commvault Cloud Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/commvault?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/commvault?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_commvault_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CommVault-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"commvault\"","tags":["indices"]}},"/v3/index/compass-security":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the compass-security index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Compass Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/compass-security?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/compass-security?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_compass-security_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CompassSecurity-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"compass-security\"","tags":["indices"]}},"/v3/index/composer":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the composer index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PHP Composer packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/composer?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/composer?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_composer_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"composer\"","tags":["indices"]}},"/v3/index/conan":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the conan index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** C/C++ packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/conan?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/conan?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_conan_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"conan\"","tags":["indices"]}},"/v3/index/coreimpact":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the coreimpact index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Core Impact\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/coreimpact?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/coreimpact?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_coreimpact_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CoreImpactExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"coreimpact\"","tags":["indices"]}},"/v3/index/cpe-vulnerable":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cpe-vulnerable index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Unrolled VulnCheck CPEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cpe-vulnerable?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cpe-vulnerable?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cpe-vulnerable_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VCVulnerableCPEs-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cpe-vulnerable\"","tags":["indices"]}},"/v3/index/crestron":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the crestron index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Crestron Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/crestron?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/crestron?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_crestron_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Crestron-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"crestron\"","tags":["indices"]}},"/v3/index/crowdsec":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the crowdsec index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CrowdSec Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/crowdsec?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/crowdsec?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_crowdsec_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CrowdSec-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"crowdsec\"","tags":["indices"]}},"/v3/index/curl":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the curl index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Curl CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/curl?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/curl?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_curl_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Curl-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"curl\"","tags":["indices"]}},"/v3/index/cwe":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cwe index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Common Weakness Enumeration Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cwe?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cwe?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_cwe_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_CWE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"cwe\"","tags":["indices"]}},"/v3/index/dahua":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dahua index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Dahua Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dahua?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dahua?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_dahua_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Dahua-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"dahua\"","tags":["indices"]}},"/v3/index/danfoss":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the danfoss index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Danfoss Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/danfoss?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/danfoss?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_danfoss_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Danfoss-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"danfoss\"","tags":["indices"]}},"/v3/index/dassault":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dassault index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Dassault Systèmes Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dassault?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dassault?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_dassault_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Dassault-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"dassault\"","tags":["indices"]}},"/v3/index/debian":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the debian index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Debian Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/debian?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/debian?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_debian_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VulnerableDebianPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"debian\"","tags":["indices"]}},"/v3/index/debian-dsa":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the debian-dsa index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Debian Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/debian-dsa?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/debian-dsa?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_debian-dsa_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_DebianSecurityAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"debian-dsa\"","tags":["indices"]}},"/v3/index/debian-packages":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the debian-packages index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Debian Packages\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/debian-packages?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/debian-packages?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_debian-packages_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_DistroPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"debian-packages\"","tags":["indices"]}},"/v3/index/debian-purls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the debian-purls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Debian PURLs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/debian-purls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/debian-purls?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_debian-purls_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"debian-purls\"","tags":["indices"]}},"/v3/index/dell":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dell index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Dell Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dell?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dell?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_dell_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Dell-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"dell\"","tags":["indices"]}},"/v3/index/delta":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the delta index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Delta Controls Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/delta?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/delta?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_delta_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_DeltaAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"delta\"","tags":["indices"]}},"/v3/index/dfn-cert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dfn-cert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** DFN-CERT Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dfn-cert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dfn-cert?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_dfn-cert_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_DFNCert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"dfn-cert\"","tags":["indices"]}},"/v3/index/django":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the django index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Django Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/django?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/django?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_django_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Django-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"django\"","tags":["indices"]}},"/v3/index/dlink":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dlink index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** DLink Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dlink?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dlink?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_dlink_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_DLink-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"dlink\"","tags":["indices"]}},"/v3/index/dnn":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dnn index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** DNN Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dnn?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dnn?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_dnn_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_DNN-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"dnn\"","tags":["indices"]}},"/v3/index/dotcms":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dotcms index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** DotCMS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dotcms?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dotcms?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_dotcms_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_DotCMS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"dotcms\"","tags":["indices"]}},"/v3/index/dragos":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dragos index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Dragos Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dragos?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dragos?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_dragos_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_DragosAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"dragos\"","tags":["indices"]}},"/v3/index/draytek":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the draytek index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** DrayTek Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/draytek?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/draytek?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_draytek_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Draytek-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"draytek\"","tags":["indices"]}},"/v3/index/drupal":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the drupal index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Drupal Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/drupal?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/drupal?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_drupal_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Drupal-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"drupal\"","tags":["indices"]}},"/v3/index/eaton":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the eaton index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Eaton Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/eaton?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/eaton?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_eaton_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_EatonAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"eaton\"","tags":["indices"]}},"/v3/index/elastic":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the elastic index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Elastic Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/elastic?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/elastic?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_elastic_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Elastic-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"elastic\"","tags":["indices"]}},"/v3/index/elspec":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the elspec index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Elspec Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/elspec?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/elspec?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_elspec_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Elspec-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"elspec\"","tags":["indices"]}},"/v3/index/emerging-threats-snort":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the emerging-threats-snort index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Emerging Threats Snort\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/emerging-threats-snort?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/emerging-threats-snort?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_emerging-threats-snort_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_EmergingThreatsSnort-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"emerging-threats-snort\"","tags":["indices"]}},"/v3/index/emerson":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the emerson index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Emerson Cyber Security Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/emerson?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/emerson?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_emerson_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_EmersonAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"emerson\"","tags":["indices"]}},"/v3/index/endoflife":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the endoflife index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** End Of Life\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/endoflife?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/endoflife?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_endoflife_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_EndOfLife-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"endoflife\"","tags":["indices"]}},"/v3/index/endress":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the endress index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Endress \u0026 Hauser Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/endress?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/endress?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_endress_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Endress-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"endress\"","tags":["indices"]}},"/v3/index/eol":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the eol index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck EOL Coverage\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/eol?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/eol?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_eol_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_EOLReleaseData-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"eol\"","tags":["indices"]}},"/v3/index/eol-alibaba":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the eol-alibaba index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Alibaba EOL\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/eol-alibaba?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/eol-alibaba?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_eol-alibaba_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_EOLAlibaba-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"eol-alibaba\"","tags":["indices"]}},"/v3/index/eol-microsoft":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the eol-microsoft index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Microsoft EOL\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/eol-microsoft?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/eol-microsoft?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_eol-microsoft_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_EOLMicrosoft-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"eol-microsoft\"","tags":["indices"]}},"/v3/index/epss":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the epss index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** EPSS Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/epss?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/epss?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_epss_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_EPSSData-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"epss\"","tags":["indices"]}},"/v3/index/euvd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the euvd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** European Union Vulnerability Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/euvd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/euvd?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_euvd_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_EUVD-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"euvd\"","tags":["indices"]}},"/v3/index/exodus-intel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the exodus-intel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Exodus Intelligence Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/exodus-intel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/exodus-intel?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_exodus-intel_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ExodusIntel-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"exodus-intel\"","tags":["indices"]}},"/v3/index/exploit-chains":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the exploit-chains index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Exploit Chains\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/exploit-chains?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/exploit-chains?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_exploit-chains_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_ExploitChain-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"exploit-chains\"","tags":["indices"]}},"/v3/index/exploitdb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the exploitdb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** The Exploit Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/exploitdb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/exploitdb?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_exploitdb_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ExploitDBExploitv2-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"exploitdb\"","tags":["indices"]}},"/v3/index/exploits":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the exploits index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Exploit Intelligence Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/exploits?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/exploits?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_exploits_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_ExploitV3Result-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"exploits\"","tags":["indices"]}},"/v3/index/exploits-changelog":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the exploits-changelog index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Changelog for VC Exploits Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/exploits-changelog?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/exploits-changelog?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_exploits-changelog_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_ExploitsChangelog-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"exploits-changelog\"","tags":["indices"]}},"/v3/index/f-secure":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the f-secure index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** F-Secure Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/f-secure?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/f-secure?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_f-secure_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_FSecure-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"f-secure\"","tags":["indices"]}},"/v3/index/f5":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the f5 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** F5 Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/f5?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/f5?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_f5_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_F5-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"f5\"","tags":["indices"]}},"/v3/index/fanuc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fanuc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Fanuc Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fanuc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fanuc?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_fanuc_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Fanuc-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"fanuc\"","tags":["indices"]}},"/v3/index/fastly":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fastly index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Fastly Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fastly?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fastly?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_fastly_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Fastly-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"fastly\"","tags":["indices"]}},"/v3/index/fedora":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fedora index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Fedora Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fedora?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fedora?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_fedora_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Update-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"fedora\"","tags":["indices"]}},"/v3/index/festo":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the festo index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Festo Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/festo?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/festo?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_festo_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Festo-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"festo\"","tags":["indices"]}},"/v3/index/filecloud":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the filecloud index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** FileCloud Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/filecloud?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/filecloud?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_filecloud_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_FileCloud-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"filecloud\"","tags":["indices"]}},"/v3/index/filezilla":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the filezilla index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** FileZilla Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/filezilla?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/filezilla?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_filezilla_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_FileZilla-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"filezilla\"","tags":["indices"]}},"/v3/index/flatt-security":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the flatt-security index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Flatt Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/flatt-security?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/flatt-security?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_flatt-security_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_FlattSecurity-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"flatt-security\"","tags":["indices"]}},"/v3/index/forgerock":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the forgerock index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ForgeRock Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/forgerock?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/forgerock?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_forgerock_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ForgeRock-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"forgerock\"","tags":["indices"]}},"/v3/index/fortinet":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fortinet index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** FortiGuard Fortinet\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fortinet?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fortinet?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_fortinet_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_FortinetAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"fortinet\"","tags":["indices"]}},"/v3/index/fortinet-ips":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fortinet-ips index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Fortinet Labs Threat Encyclopedia\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fortinet-ips?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fortinet-ips?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_fortinet-ips_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_FortinetIPS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"fortinet-ips\"","tags":["indices"]}},"/v3/index/foxit":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the foxit index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Foxit Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/foxit?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/foxit?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_foxit_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Foxit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"foxit\"","tags":["indices"]}},"/v3/index/freebsd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the freebsd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** FreeBSD Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/freebsd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/freebsd?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_freebsd_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Advisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"freebsd\"","tags":["indices"]}},"/v3/index/fresenius":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fresenius index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Fresenius Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fresenius?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fresenius?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_fresenius_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Fresenius-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"fresenius\"","tags":["indices"]}},"/v3/index/gallagher":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gallagher index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Gallagher Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gallagher?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gallagher?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_gallagher_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Gallagher-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"gallagher\"","tags":["indices"]}},"/v3/index/gcp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gcp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GCP Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gcp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gcp?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_gcp_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GCP-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"gcp\"","tags":["indices"]}},"/v3/index/ge-gas":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ge-gas index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GE Gas Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ge-gas?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ge-gas?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ge-gas_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GEGas-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ge-gas\"","tags":["indices"]}},"/v3/index/ge-healthcare":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ge-healthcare index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GE Healthcare Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ge-healthcare?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ge-healthcare?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ge-healthcare_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GEHealthcareAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ge-healthcare\"","tags":["indices"]}},"/v3/index/gem":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gem index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ruby (gem) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gem?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gem?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_gem_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"gem\"","tags":["indices"]}},"/v3/index/gen":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gen index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Gen Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gen?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gen?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_gen_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Gen-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"gen\"","tags":["indices"]}},"/v3/index/genetec":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the genetec index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Genetec Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/genetec?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/genetec?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_genetec_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Genetec-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"genetec\"","tags":["indices"]}},"/v3/index/ghsa":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ghsa index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GHSA\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ghsa?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ghsa?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ghsa_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GHSA-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ghsa\"","tags":["indices"]}},"/v3/index/gigabyte":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gigabyte index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GIGABYTE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gigabyte?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gigabyte?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_gigabyte_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Gigabyte-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"gigabyte\"","tags":["indices"]}},"/v3/index/gitee-exploits":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gitee-exploits index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Gitee Exploits\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gitee-exploits?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gitee-exploits?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_gitee-exploits_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GiteeExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"gitee-exploits\"","tags":["indices"]}},"/v3/index/github-exploits":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the github-exploits index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GitHub Exploits\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/github-exploits?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/github-exploits?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_github-exploits_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GitHubExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"github-exploits\"","tags":["indices"]}},"/v3/index/github-security-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the github-security-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Github Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/github-security-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/github-security-advisories?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_github-security-advisories_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GHAdvisoryJSONLean-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"github-security-advisories\"","tags":["indices"]}},"/v3/index/gitlab-advisories-community":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gitlab-advisories-community index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GitLab Advisory Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gitlab-advisories-community?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gitlab-advisories-community?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_gitlab-advisories-community_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GitlabAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"gitlab-advisories-community\"","tags":["indices"]}},"/v3/index/gitlab-exploits":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gitlab-exploits index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GitLab Exploits\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gitlab-exploits?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gitlab-exploits?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_gitlab-exploits_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GitLabExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"gitlab-exploits\"","tags":["indices"]}},"/v3/index/glibc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the glibc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Glibc Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/glibc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/glibc?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_glibc_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Glibc-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"glibc\"","tags":["indices"]}},"/v3/index/gmo-cybersecurity":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gmo-cybersecurity index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GMO Cybersecurity Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gmo-cybersecurity?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gmo-cybersecurity?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_gmo-cybersecurity_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GMOCyberSecurity-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"gmo-cybersecurity\"","tags":["indices"]}},"/v3/index/gnutls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gnutls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GnuTLS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gnutls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gnutls?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_gnutls_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GnuTLS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"gnutls\"","tags":["indices"]}},"/v3/index/go-vulndb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the go-vulndb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Go Vulnerability Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/go-vulndb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/go-vulndb?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_go-vulndb_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GoVulnJSON-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"go-vulndb\"","tags":["indices"]}},"/v3/index/golang":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the golang index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Golang packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/golang?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/golang?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_golang_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"golang\"","tags":["indices"]}},"/v3/index/google-0day-itw":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the google-0day-itw index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Project Zero In the Wild Exploits\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/google-0day-itw?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/google-0day-itw?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_google-0day-itw_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ITWExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"google-0day-itw\"","tags":["indices"]}},"/v3/index/google-container-optimized-os":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the google-container-optimized-os index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Container OS Release Notes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/google-container-optimized-os?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/google-container-optimized-os?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_google-container-optimized-os_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ContainerOS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"google-container-optimized-os\"","tags":["indices"]}},"/v3/index/grafana":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the grafana index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Grafana Labs Security Fixes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/grafana?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/grafana?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_grafana_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Grafana-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"grafana\"","tags":["indices"]}},"/v3/index/greynoise-metadata":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the greynoise-metadata index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GreyNoise Metadata\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/greynoise-metadata?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/greynoise-metadata?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_greynoise-metadata_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GreyNoiseDetection-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"greynoise-metadata\"","tags":["indices"]}},"/v3/index/hackage":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hackage index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hackage (Haskell) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hackage?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hackage?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hackage_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hackage\"","tags":["indices"]}},"/v3/index/hacktivity":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hacktivity index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hackerone Hacktivity\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hacktivity?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hacktivity?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hacktivity_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Hacktivity-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hacktivity\"","tags":["indices"]}},"/v3/index/harmonyos":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the harmonyos index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HarmonyOS Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/harmonyos?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/harmonyos?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_harmonyos_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HarmonyOS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"harmonyos\"","tags":["indices"]}},"/v3/index/hashicorp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hashicorp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HashiCorp Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hashicorp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hashicorp?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hashicorp_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HashiCorp-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hashicorp\"","tags":["indices"]}},"/v3/index/haskell-sadb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the haskell-sadb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Haskell Security Advisory DB\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/haskell-sadb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/haskell-sadb?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_haskell-sadb_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HaskellSADBAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"haskell-sadb\"","tags":["indices"]}},"/v3/index/hcl":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hcl index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HCLSoftware Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hcl?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hcl?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hcl_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HCL-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hcl\"","tags":["indices"]}},"/v3/index/hex":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hex index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hex (Erlang) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hex?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hex?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hex_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hex\"","tags":["indices"]}},"/v3/index/hikvision":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hikvision index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hikvision Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hikvision?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hikvision?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hikvision_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HIKVision-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hikvision\"","tags":["indices"]}},"/v3/index/hillrom":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hillrom index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hillrom Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hillrom?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hillrom?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hillrom_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HillromAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hillrom\"","tags":["indices"]}},"/v3/index/hitachi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hitachi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hitachi Software Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hitachi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hitachi?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hitachi_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Hitachi-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hitachi\"","tags":["indices"]}},"/v3/index/hitachi-energy":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hitachi-energy index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hitachi Energy Cybersecurity Advisories and Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hitachi-energy?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hitachi-energy?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hitachi-energy_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HitachiEnergy-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hitachi-energy\"","tags":["indices"]}},"/v3/index/hkcert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hkcert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hong Kong CERT Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hkcert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hkcert?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hkcert_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HKCert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hkcert\"","tags":["indices"]}},"/v3/index/hms":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hms index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HMS (Hardware Meets Software) Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hms?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hms?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hms_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HMS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hms\"","tags":["indices"]}},"/v3/index/honeywell":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the honeywell index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Honeywell Cyber Security Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/honeywell?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/honeywell?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_honeywell_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Honeywell-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"honeywell\"","tags":["indices"]}},"/v3/index/hp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HP Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hp?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hp_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HP-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hp\"","tags":["indices"]}},"/v3/index/hp-eol":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hp-eol index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** End of Life Data for Hewlett-Packard Products\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hp-eol?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hp-eol?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hp-eol_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GenericEOL-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hp-eol\"","tags":["indices"]}},"/v3/index/hpe":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hpe index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HPE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hpe?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hpe?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hpe_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HPE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hpe\"","tags":["indices"]}},"/v3/index/hpe-eol":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hpe-eol index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hewlett-Packard Enterprise End of Life Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hpe-eol?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hpe-eol?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_hpe-eol_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GenericEOL-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"hpe-eol\"","tags":["indices"]}},"/v3/index/huawei-euleros":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the huawei-euleros index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenEuler Operating System Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-euleros?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/huawei-euleros?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_huawei-euleros_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HuaweiEulerOS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"huawei-euleros\"","tags":["indices"]}},"/v3/index/huawei-ips":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the huawei-ips index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Huawei IPS Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-ips?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/huawei-ips?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_huawei-ips_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HuaweiIPS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"huawei-ips\"","tags":["indices"]}},"/v3/index/huawei-psirt":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the huawei-psirt index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Huawei Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-psirt?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/huawei-psirt?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_huawei-psirt_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Huawei-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"huawei-psirt\"","tags":["indices"]}},"/v3/index/iava":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the iava index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Information Assurance Vulnerability Alerts (IAVA)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/iava?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/iava?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_iava_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IAVA-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"iava\"","tags":["indices"]}},"/v3/index/ibm":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ibm index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** IBM Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ibm?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ibm?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ibm_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IBM-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ibm\"","tags":["indices"]}},"/v3/index/idemia":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the idemia index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Idemia Product Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/idemia?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/idemia?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_idemia_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Idemia-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"idemia\"","tags":["indices"]}},"/v3/index/igel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the igel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** IGEL Security Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/igel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/igel?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_igel_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Igel-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"igel\"","tags":["indices"]}},"/v3/index/il-alerts":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the il-alerts index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Gov.il Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/il-alerts?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/il-alerts?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_il-alerts_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IsraeliAlert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"il-alerts\"","tags":["indices"]}},"/v3/index/il-vulnerabilities":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the il-vulnerabilities index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Gov.il CVE Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/il-vulnerabilities?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/il-vulnerabilities?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_il-vulnerabilities_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IsraeliVulnerability-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"il-vulnerabilities\"","tags":["indices"]}},"/v3/index/incibe":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the incibe index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Incibe CERT Early Warnings\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/incibe?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/incibe?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_incibe_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IncibeAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"incibe\"","tags":["indices"]}},"/v3/index/initial-access":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the initial-access index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Initial Access Intelligence\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/initial-access?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_initial-access_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_InitialAccess-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"initial-access\"","tags":["indices"]}},"/v3/index/initial-access-git":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the initial-access-git index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Initial Access Intelligence Git Backup for Subscribers\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access-git?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/initial-access-git?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_initial-access-git_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_InitialAccess-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"initial-access-git\"","tags":["indices"]}},"/v3/index/intel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the intel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Intel® Product Security Center Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/intel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/intel?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_intel_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Intel-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"intel\"","tags":["indices"]}},"/v3/index/ipintel-10d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ipintel-10d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 10-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-10d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ipintel-10d?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ipintel-10d_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify an IPv4 or IPv6 CIDR","in":"query","name":"cidr","schema":{"type":"string"}},{"description":"Autonomous system number","in":"query","name":"asn","schema":{"type":"string"}},{"description":"Country name ISO-3166?? format","in":"query","name":"country","schema":{"type":"string"}},{"description":"Country code in ISO-3166?? format","in":"query","name":"country_code","schema":{"type":"string"}},{"description":"Record type","in":"query","name":"id","schema":{"type":"string"}},{"description":"Kind of IpIntel Finding","in":"query","name":"kind","schema":{"type":"string"}},{"description":"Match a string in the list of hostnames","in":"query","name":"hostname","schema":{"type":"string"}},{"description":"Search for a string in the field describing the finding","in":"query","name":"matches","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ipintel-10d\"","tags":["indices"]}},"/v3/index/ipintel-30d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ipintel-30d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 30-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-30d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ipintel-30d?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ipintel-30d_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify an IPv4 or IPv6 CIDR","in":"query","name":"cidr","schema":{"type":"string"}},{"description":"Autonomous system number","in":"query","name":"asn","schema":{"type":"string"}},{"description":"Country name ISO-3166?? format","in":"query","name":"country","schema":{"type":"string"}},{"description":"Country code in ISO-3166?? format","in":"query","name":"country_code","schema":{"type":"string"}},{"description":"Record type","in":"query","name":"id","schema":{"type":"string"}},{"description":"Kind of IpIntel Finding","in":"query","name":"kind","schema":{"type":"string"}},{"description":"Match a string in the list of hostnames","in":"query","name":"hostname","schema":{"type":"string"}},{"description":"Search for a string in the field describing the finding","in":"query","name":"matches","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ipintel-30d\"","tags":["indices"]}},"/v3/index/ipintel-3d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ipintel-3d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 3-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-3d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ipintel-3d?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ipintel-3d_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify an IPv4 or IPv6 CIDR","in":"query","name":"cidr","schema":{"type":"string"}},{"description":"Autonomous system number","in":"query","name":"asn","schema":{"type":"string"}},{"description":"Country name ISO-3166?? format","in":"query","name":"country","schema":{"type":"string"}},{"description":"Country code in ISO-3166?? format","in":"query","name":"country_code","schema":{"type":"string"}},{"description":"Record type","in":"query","name":"id","schema":{"type":"string"}},{"description":"Kind of IpIntel Finding","in":"query","name":"kind","schema":{"type":"string"}},{"description":"Match a string in the list of hostnames","in":"query","name":"hostname","schema":{"type":"string"}},{"description":"Search for a string in the field describing the finding","in":"query","name":"matches","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ipintel-3d\"","tags":["indices"]}},"/v3/index/ipintel-90d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ipintel-90d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 90-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-90d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ipintel-90d?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ipintel-90d_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify an IPv4 or IPv6 CIDR","in":"query","name":"cidr","schema":{"type":"string"}},{"description":"Autonomous system number","in":"query","name":"asn","schema":{"type":"string"}},{"description":"Country name ISO-3166?? format","in":"query","name":"country","schema":{"type":"string"}},{"description":"Country code in ISO-3166?? format","in":"query","name":"country_code","schema":{"type":"string"}},{"description":"Record type","in":"query","name":"id","schema":{"type":"string"}},{"description":"Kind of IpIntel Finding","in":"query","name":"kind","schema":{"type":"string"}},{"description":"Match a string in the list of hostnames","in":"query","name":"hostname","schema":{"type":"string"}},{"description":"Search for a string in the field describing the finding","in":"query","name":"matches","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ipintel-90d\"","tags":["indices"]}},"/v3/index/istio":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the istio index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Istio Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/istio?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/istio?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_istio_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Istio-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"istio\"","tags":["indices"]}},"/v3/index/ivanti":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ivanti index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ivanti Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ivanti?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ivanti_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Ivanti-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ivanti\"","tags":["indices"]}},"/v3/index/ivanti-rss":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ivanti-rss index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ivanti Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti-rss?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ivanti-rss?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ivanti-rss_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IvantiRSS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ivanti-rss\"","tags":["indices"]}},"/v3/index/jenkins":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jenkins index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Jenkins Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jenkins?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jenkins?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_jenkins_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Jenkins-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"jenkins\"","tags":["indices"]}},"/v3/index/jetbrains":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jetbrains index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** JetBrains Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jetbrains?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jetbrains?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_jetbrains_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_JetBrains-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"jetbrains\"","tags":["indices"]}},"/v3/index/jfrog":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jfrog index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** JFrog Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jfrog?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jfrog?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_jfrog_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_JFrog-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"jfrog\"","tags":["indices"]}},"/v3/index/jnj":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jnj index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Johnson \u0026 Johnson Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jnj?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jnj?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_jnj_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_JNJAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"jnj\"","tags":["indices"]}},"/v3/index/johnson-controls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the johnson-controls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Security Advisories - Johnson Controls\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/johnson-controls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/johnson-controls?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_johnson-controls_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_JohnsonControls-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"johnson-controls\"","tags":["indices"]}},"/v3/index/juniper":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the juniper index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Juniper Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/juniper?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/juniper?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_juniper_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Juniper-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"juniper\"","tags":["indices"]}},"/v3/index/jvn":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jvn index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Japan Vulnerability Notes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jvn?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jvn?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_jvn_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_JVN-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"jvn\"","tags":["indices"]}},"/v3/index/jvndb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jvndb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Japan Vulnerability Notes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jvndb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jvndb?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_jvndb_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_JVNAdvisoryItem-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"jvndb\"","tags":["indices"]}},"/v3/index/kaspersky-ics-cert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the kaspersky-ics-cert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Kaspersky ICS CERT\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/kaspersky-ics-cert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/kaspersky-ics-cert?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_kaspersky-ics-cert_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_KasperskyICSCERTAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"kaspersky-ics-cert\"","tags":["indices"]}},"/v3/index/korelogic":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the korelogic index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** KoreLogic Vulnerability Research and Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/korelogic?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/korelogic?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_korelogic_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_KoreLogic-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"korelogic\"","tags":["indices"]}},"/v3/index/krcert-security-notices":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the krcert-security-notices index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** KR-CERT Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-security-notices?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/krcert-security-notices?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_krcert-security-notices_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_KRCertAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"krcert-security-notices\"","tags":["indices"]}},"/v3/index/krcert-vulnerabilities":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the krcert-vulnerabilities index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** KR-CERT Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-vulnerabilities?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/krcert-vulnerabilities?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_krcert-vulnerabilities_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_KRCertAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"krcert-vulnerabilities\"","tags":["indices"]}},"/v3/index/kubernetes":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the kubernetes index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Kubernetes Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/kubernetes?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/kubernetes?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_kubernetes_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_K8S-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"kubernetes\"","tags":["indices"]}},"/v3/index/kunbus":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the kunbus index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** KunBus Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/kunbus?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/kunbus?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_kunbus_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Kunbus-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"kunbus\"","tags":["indices"]}},"/v3/index/lantronix":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the lantronix index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Lantronix Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/lantronix?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/lantronix?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_lantronix_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Lantronix-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"lantronix\"","tags":["indices"]}},"/v3/index/lenovo":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the lenovo index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Lenovo Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/lenovo?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/lenovo?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_lenovo_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Lenovo-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"lenovo\"","tags":["indices"]}},"/v3/index/lexmark":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the lexmark index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Lexmark Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/lexmark?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/lexmark?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_lexmark_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_LexmarkAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"lexmark\"","tags":["indices"]}},"/v3/index/lg":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the lg index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** LG Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/lg?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/lg?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_lg_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_LG-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"lg\"","tags":["indices"]}},"/v3/index/libre-office":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the libre-office index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Libre Office Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/libre-office?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/libre-office?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_libre-office_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_LibreOffice-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"libre-office\"","tags":["indices"]}},"/v3/index/linux":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the linux index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Linux Kernel Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/linux?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/linux?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_linux_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Linux-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"linux\"","tags":["indices"]}},"/v3/index/lol-advs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the lol-advs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Living Off the Land Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/lol-advs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/lol-advs?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_lol-advs_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_LolAdvs-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"lol-advs\"","tags":["indices"]}},"/v3/index/m-files":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the m-files index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** M-Files Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/m-files?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/m-files?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_m-files_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MFiles-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"m-files\"","tags":["indices"]}},"/v3/index/macert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the macert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Moroccan CERT Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/macert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/macert?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_macert_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MACert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"macert\"","tags":["indices"]}},"/v3/index/malicious-packages":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the malicious-packages index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Malicious Packages\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/malicious-packages?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/malicious-packages?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_malicious-packages_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MaliciousPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"malicious-packages\"","tags":["indices"]}},"/v3/index/malicious-vscode-exts":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the malicious-vscode-exts index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Malicious Visual Studio Code Extensions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/malicious-vscode-exts?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/malicious-vscode-exts?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_malicious-vscode-exts_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MaliciousVSCodeExts-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"malicious-vscode-exts\"","tags":["indices"]}},"/v3/index/manageengine":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the manageengine index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ManageEngine Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/manageengine?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/manageengine?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_manageengine_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ManageEngineAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"manageengine\"","tags":["indices"]}},"/v3/index/maven":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the maven index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Maven (Java) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/maven?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/maven?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_maven_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"maven\"","tags":["indices"]}},"/v3/index/mbed-tls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mbed-tls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mbed TLS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mbed-tls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mbed-tls?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_mbed-tls_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MbedTLS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"mbed-tls\"","tags":["indices"]}},"/v3/index/mcafee":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mcafee index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** McAfee Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mcafee?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mcafee?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_mcafee_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_McAfee-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"mcafee\"","tags":["indices"]}},"/v3/index/mediatek":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mediatek index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MediaTek Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mediatek?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mediatek?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_mediatek_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Mediatek-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"mediatek\"","tags":["indices"]}},"/v3/index/medtronic":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the medtronic index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Medtronic Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/medtronic?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/medtronic?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_medtronic_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MedtronicAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"medtronic\"","tags":["indices"]}},"/v3/index/mendix":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mendix index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mendix Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mendix?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mendix?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_mendix_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Mendix-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"mendix\"","tags":["indices"]}},"/v3/index/meta-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the meta-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Meta Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/meta-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/meta-advisories?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_meta-advisories_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MetaAdvisories-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"meta-advisories\"","tags":["indices"]}},"/v3/index/metasploit":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the metasploit index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Metasploit Modules\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/metasploit?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/metasploit?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_metasploit_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MetasploitExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"metasploit\"","tags":["indices"]}},"/v3/index/microsoft-csaf":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the microsoft-csaf index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Microsoft CSAF\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-csaf?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/microsoft-csaf?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_microsoft-csaf_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MicrosoftCSAF-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"microsoft-csaf\"","tags":["indices"]}},"/v3/index/microsoft-cvrf":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the microsoft-cvrf index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Microsoft Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-cvrf?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/microsoft-cvrf?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_microsoft-cvrf_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MicrosoftCVRF-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"microsoft-cvrf\"","tags":["indices"]}},"/v3/index/microsoft-driver-block-list":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the microsoft-driver-block-list index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Microsoft's Vulnerable Drivers Blocklist\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-driver-block-list?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/microsoft-driver-block-list?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_microsoft-driver-block-list_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MicrosoftDriverBlockList-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"microsoft-driver-block-list\"","tags":["indices"]}},"/v3/index/microsoft-kb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the microsoft-kb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Microsoft KB list by CVE\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-kb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/microsoft-kb?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_microsoft-kb_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MicrosoftKb-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"microsoft-kb\"","tags":["indices"]}},"/v3/index/mikrotik":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mikrotik index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MikroTik Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mikrotik?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mikrotik?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_mikrotik_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Mikrotik-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"mikrotik\"","tags":["indices"]}},"/v3/index/mindray":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mindray index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mindray Cybersecurity Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mindray?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mindray?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_mindray_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Mindray-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"mindray\"","tags":["indices"]}},"/v3/index/misp-threat-actors":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the misp-threat-actors index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MISP Threat Actors\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/misp-threat-actors?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/misp-threat-actors?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_misp-threat-actors_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MispValue-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"misp-threat-actors\"","tags":["indices"]}},"/v3/index/mitel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mitel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mitel Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mitel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mitel?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_mitel_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Mitel-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"mitel\"","tags":["indices"]}},"/v3/index/mitre-attack-cve":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mitre-attack-cve index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MITRE ATT\u0026CK Technique ID to CVE List\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-attack-cve?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mitre-attack-cve?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_mitre-attack-cve_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_MitreAttackToCVE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"mitre-attack-cve\"","tags":["indices"]}},"/v3/index/mitre-cvelist-v5":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mitre-cvelist-v5 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MITRE CVEList V5\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-cvelist-v5?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mitre-cvelist-v5?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_mitre-cvelist-v5_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MitreCVEListV5-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"mitre-cvelist-v5\"","tags":["indices"]}},"/v3/index/mitsubishi-electric":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mitsubishi-electric index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mitsubishi Electric Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mitsubishi-electric?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mitsubishi-electric?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_mitsubishi-electric_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MitsubishiElectricAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"mitsubishi-electric\"","tags":["indices"]}},"/v3/index/mongodb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mongodb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MongoDB Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mongodb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mongodb?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_mongodb_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MongoDB-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"mongodb\"","tags":["indices"]}},"/v3/index/moxa":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the moxa index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Moxa Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/moxa?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/moxa?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_moxa_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MoxaAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"moxa\"","tags":["indices"]}},"/v3/index/mozilla":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mozilla index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mozilla Foundation Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mozilla?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mozilla?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_mozilla_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MozillaAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"mozilla\"","tags":["indices"]}},"/v3/index/naver":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the naver index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Naver Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/naver?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/naver?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_naver_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Naver-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"naver\"","tags":["indices"]}},"/v3/index/ncsc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ncsc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NCSC Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ncsc?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ncsc_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NCSC-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ncsc\"","tags":["indices"]}},"/v3/index/ncsc-cves":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ncsc-cves index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NCSC CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc-cves?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ncsc-cves?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ncsc-cves_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NCSCCVE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ncsc-cves\"","tags":["indices"]}},"/v3/index/nec":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nec index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NEC Security Information Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nec?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nec?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nec_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NEC-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nec\"","tags":["indices"]}},"/v3/index/nessus":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nessus index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nessus Plugins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nessus?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nessus?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nessus_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Nessus-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nessus\"","tags":["indices"]}},"/v3/index/netapp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the netapp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NetApp Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/netapp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/netapp?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_netapp_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NetApp-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"netapp\"","tags":["indices"]}},"/v3/index/netatalk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the netatalk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Netatalk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/netatalk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/netatalk?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_netatalk_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Netatalk-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"netatalk\"","tags":["indices"]}},"/v3/index/netgate":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the netgate index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Netgate Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/netgate?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/netgate?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_netgate_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Netgate-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"netgate\"","tags":["indices"]}},"/v3/index/netgear":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the netgear index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NETGEAR Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/netgear?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/netgear?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_netgear_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Netgear-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"netgear\"","tags":["indices"]}},"/v3/index/netskope":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the netskope index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Netskope Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/netskope?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/netskope?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_netskope_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Netskope-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"netskope\"","tags":["indices"]}},"/v3/index/nexpose":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nexpose index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nexpose Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nexpose?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nexpose?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nexpose_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Nexpose-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nexpose\"","tags":["indices"]}},"/v3/index/nginx":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nginx index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nginx Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nginx?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nginx?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nginx_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NginxAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nginx\"","tags":["indices"]}},"/v3/index/nhs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nhs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NHS Cyber Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nhs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nhs?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nhs_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NHS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nhs\"","tags":["indices"]}},"/v3/index/ni":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ni index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** National Instruments Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ni?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ni?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ni_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NI-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ni\"","tags":["indices"]}},"/v3/index/nist-nvd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nist-nvd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NIST NVD 1.0 CVE data built from NIST NVD 2.0 CVE Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nist-nvd?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nist-nvd_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_CveItems-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nist-nvd\"","tags":["indices"]}},"/v3/index/nist-nvd2":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NIST NVD 2.0\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nist-nvd2?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nist-nvd2_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_NVD20CVE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nist-nvd2\"","tags":["indices"]}},"/v3/index/nist-nvd2-cpematch":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-cpematch index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NIST NVD 2.0 CPE Match\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-cpematch?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nist-nvd2-cpematch?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nist-nvd2-cpematch_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_NVD20CPEMatch-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nist-nvd2-cpematch\"","tags":["indices"]}},"/v3/index/nist-nvd2-sources":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-sources index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NIST NVD 2.0 Source Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-sources?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nist-nvd2-sources?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nist-nvd2-sources_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NVD20Source-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nist-nvd2-sources\"","tags":["indices"]}},"/v3/index/node-security":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the node-security index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Node.js Security Working Group Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/node-security?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/node-security?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_node-security_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NodeSecurity-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"node-security\"","tags":["indices"]}},"/v3/index/nodejs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nodejs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NodeJS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nodejs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nodejs?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nodejs_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NodeJS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nodejs\"","tags":["indices"]}},"/v3/index/nokia":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nokia index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nokia Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nokia?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nokia?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nokia_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Nokia-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nokia\"","tags":["indices"]}},"/v3/index/notepadplusplus":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the notepadplusplus index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Notepad++ Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/notepadplusplus?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/notepadplusplus?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_notepadplusplus_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NotePadPlusPlus-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"notepadplusplus\"","tags":["indices"]}},"/v3/index/nozomi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nozomi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nozomi Networks Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nozomi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nozomi?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nozomi_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Nozomi-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nozomi\"","tags":["indices"]}},"/v3/index/npm":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the npm index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NPM (JS/TS) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/npm?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/npm?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_npm_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"npm\"","tags":["indices"]}},"/v3/index/ntp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ntp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NTP Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ntp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ntp?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ntp_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NTP-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ntp\"","tags":["indices"]}},"/v3/index/nuclei":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nuclei index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nuclei Templates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nuclei?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nuclei?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nuclei_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Nuclei-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nuclei\"","tags":["indices"]}},"/v3/index/nuget":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nuget index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nuget (C#/F#) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nuget?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nuget?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nuget_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nuget\"","tags":["indices"]}},"/v3/index/nvd-cpe-dictionary":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nvd-cpe-dictionary index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NVD's CPE Dictionary\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nvd-cpe-dictionary?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nvd-cpe-dictionary?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nvd-cpe-dictionary_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NVDCPEDictionary-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nvd-cpe-dictionary\"","tags":["indices"]}},"/v3/index/nvidia":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nvidia index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NVIDIA Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nvidia?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nvidia?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nvidia_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SecurityBulletin-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nvidia\"","tags":["indices"]}},"/v3/index/nz-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nz-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CERT NZ Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nz-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nz-advisories?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_nz-advisories_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NZAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"nz-advisories\"","tags":["indices"]}},"/v3/index/octopus-deploy":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the octopus-deploy index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Octopus Deploy Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/octopus-deploy?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/octopus-deploy?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_octopus-deploy_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OctopusDeploy-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"octopus-deploy\"","tags":["indices"]}},"/v3/index/okta":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the okta index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Okta Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/okta?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/okta?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_okta_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Okta-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"okta\"","tags":["indices"]}},"/v3/index/omron":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the omron index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Omron Vulnerability Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/omron?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/omron?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_omron_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Omron-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"omron\"","tags":["indices"]}},"/v3/index/omron-eol":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the omron-eol index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Omron End of Life Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/omron-eol?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/omron-eol?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_omron-eol_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GenericEOL-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"omron-eol\"","tags":["indices"]}},"/v3/index/one-e":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the one-e index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 1E Published Product Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/one-e?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/one-e?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_one-e_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OneE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"one-e\"","tags":["indices"]}},"/v3/index/opam":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the opam index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** opam (OCaml) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/opam?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/opam?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_opam_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"opam\"","tags":["indices"]}},"/v3/index/open-cvdb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the open-cvdb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** The Open Cloud Vulnerability \u0026 Security Issue Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/open-cvdb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/open-cvdb?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_open-cvdb_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OpenCVDB-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"open-cvdb\"","tags":["indices"]}},"/v3/index/openbsd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openbsd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenBSD Security Fixes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openbsd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openbsd?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_openbsd_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OpenBSD-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"openbsd\"","tags":["indices"]}},"/v3/index/opengear":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the opengear index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Opengear Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/opengear?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/opengear?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_opengear_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Opengear-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"opengear\"","tags":["indices"]}},"/v3/index/openjdk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openjdk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenJDK Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openjdk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openjdk?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_openjdk_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OpenJDK-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"openjdk\"","tags":["indices"]}},"/v3/index/openssh":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openssh index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenSSH Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openssh?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openssh?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_openssh_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OpenSSH-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"openssh\"","tags":["indices"]}},"/v3/index/openssl-secadv":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openssl-secadv index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenSSL Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openssl-secadv?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openssl-secadv?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_openssl-secadv_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OpenSSLSecAdv-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"openssl-secadv\"","tags":["indices"]}},"/v3/index/openstack":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openstack index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenStack Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openstack?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openstack?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_openstack_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OpenStack-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"openstack\"","tags":["indices"]}},"/v3/index/openwrt":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openwrt index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenWrt Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openwrt?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openwrt?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_openwrt_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_WRT-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"openwrt\"","tags":["indices"]}},"/v3/index/oracle":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the oracle index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Oracle Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/oracle?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/oracle?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_oracle_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MetaData-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"oracle\"","tags":["indices"]}},"/v3/index/oracle-cpu":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Oracle Critical Patch Update Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/oracle-cpu?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_oracle-cpu_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OracleCPU-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"oracle-cpu\"","tags":["indices"]}},"/v3/index/oracle-cpu-csaf":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu-csaf index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Oracle Critical Patch Updates CSAF\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu-csaf?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/oracle-cpu-csaf?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_oracle-cpu-csaf_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OracleCPUCSAF-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"oracle-cpu-csaf\"","tags":["indices"]}},"/v3/index/osv":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the osv index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Open Source Vulnerabilities Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/osv?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/osv?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_osv_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OSV-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"osv\"","tags":["indices"]}},"/v3/index/otrs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the otrs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OTRS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/otrs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/otrs?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_otrs_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OTRS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"otrs\"","tags":["indices"]}},"/v3/index/owncloud":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the owncloud index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OwnCloud Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/owncloud?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/owncloud?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_owncloud_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OwnCloud-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"owncloud\"","tags":["indices"]}},"/v3/index/packetstorm":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the packetstorm index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PacketStorm\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/packetstorm?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/packetstorm?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_packetstorm_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PacketstormExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"packetstorm\"","tags":["indices"]}},"/v3/index/palantir":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the palantir index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Palantir Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/palantir?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/palantir?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_palantir_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Palantir-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"palantir\"","tags":["indices"]}},"/v3/index/palo-alto":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the palo-alto index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Palo Alto Networks Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/palo-alto?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/palo-alto?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_palo-alto_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PaloAltoAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"palo-alto\"","tags":["indices"]}},"/v3/index/panasonic":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the panasonic index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Panasonic Vulnerability Advisory List\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/panasonic?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/panasonic?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_panasonic_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Panasonic-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"panasonic\"","tags":["indices"]}},"/v3/index/papercut":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the papercut index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PaperCut Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/papercut?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/papercut?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_papercut_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PaperCut-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"papercut\"","tags":["indices"]}},"/v3/index/pega":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pega index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Pega Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pega?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pega?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_pega_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Pega-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"pega\"","tags":["indices"]}},"/v3/index/philips":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the philips index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Philips Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/philips?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/philips?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_philips_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PhilipsAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"philips\"","tags":["indices"]}},"/v3/index/phoenix-contact":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the phoenix-contact index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Phoenix Contact Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/phoenix-contact?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/phoenix-contact?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_phoenix-contact_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PhoenixContactAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"phoenix-contact\"","tags":["indices"]}},"/v3/index/php-my-admin":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the php-my-admin index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** phpMyAdmin Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/php-my-admin?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/php-my-admin?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_php-my-admin_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PHPMyAdmin-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"php-my-admin\"","tags":["indices"]}},"/v3/index/pkcert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pkcert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PK CERT Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pkcert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pkcert?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_pkcert_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PKCert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"pkcert\"","tags":["indices"]}},"/v3/index/postgressql":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the postgressql index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PostgresSQL Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/postgressql?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/postgressql?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_postgressql_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PostgresSQL-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"postgressql\"","tags":["indices"]}},"/v3/index/powerdns":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the powerdns index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PowerDNS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/powerdns?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/powerdns?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_powerdns_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PowerDNS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"powerdns\"","tags":["indices"]}},"/v3/index/progress":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the progress index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Progress Product Alert Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/progress?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/progress?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_progress_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Progress-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"progress\"","tags":["indices"]}},"/v3/index/proofpoint":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the proofpoint index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Proofpoint Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/proofpoint?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/proofpoint?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_proofpoint_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Proofpoint-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"proofpoint\"","tags":["indices"]}},"/v3/index/ptc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ptc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PTC Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ptc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ptc?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ptc_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PTC-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ptc\"","tags":["indices"]}},"/v3/index/pub":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pub index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Pub (Dart/Flutter) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pub?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pub?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_pub_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"pub\"","tags":["indices"]}},"/v3/index/pure-storage":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pure-storage index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Pure Storage Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pure-storage?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pure-storage?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_pure-storage_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PureStorage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"pure-storage\"","tags":["indices"]}},"/v3/index/pypa-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pypa-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PyPA Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pypa-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pypa-advisories?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_pypa-advisories_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PyPAAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"pypa-advisories\"","tags":["indices"]}},"/v3/index/pypi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pypi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PyPi (Python) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pypi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pypi?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_pypi_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"pypi\"","tags":["indices"]}},"/v3/index/qnap":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qnap index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** QNAP Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qnap?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qnap?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_qnap_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_QNAPAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"qnap\"","tags":["indices"]}},"/v3/index/qqids":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qqids index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Qualys QIDs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qqids?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qqids?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_qqids_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_QQID-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"qqids\"","tags":["indices"]}},"/v3/index/qualcomm":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qualcomm index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Qualcomm Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qualcomm?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qualcomm?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_qualcomm_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Qualcomm-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"qualcomm\"","tags":["indices"]}},"/v3/index/qualys":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qualys index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Qualys Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qualys?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qualys?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_qualys_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Qualys-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"qualys\"","tags":["indices"]}},"/v3/index/qualys-qids":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qualys-qids index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Qualys QID\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qualys-qids?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qualys-qids?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_qualys-qids_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_QualysQID-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"qualys-qids\"","tags":["indices"]}},"/v3/index/qubes-qsb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qubes-qsb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Qubes Security Bulletin\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qubes-qsb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qubes-qsb?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_qubes-qsb_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_QSB-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"qubes-qsb\"","tags":["indices"]}},"/v3/index/ransomware":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ransomware index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Ransomware\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ransomware?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ransomware?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ransomware_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_RansomwareExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ransomware\"","tags":["indices"]}},"/v3/index/red-lion":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the red-lion index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Red-Lion Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/red-lion?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/red-lion?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_red-lion_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_RedLion-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"red-lion\"","tags":["indices"]}},"/v3/index/redhat":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the redhat index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Red Hat Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/redhat?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/redhat?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_redhat_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_RedhatCVE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"redhat\"","tags":["indices"]}},"/v3/index/redhat-cves":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the redhat-cves index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CSAF data for redhat\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/redhat-cves?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/redhat-cves?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_redhat-cves_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_RhelCVE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"redhat-cves\"","tags":["indices"]}},"/v3/index/renesas":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the renesas index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Renesas Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/renesas?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/renesas?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_renesas_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Renesas-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"renesas\"","tags":["indices"]}},"/v3/index/revive":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the revive index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Revive Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/revive?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/revive?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_revive_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Revive-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"revive\"","tags":["indices"]}},"/v3/index/roche":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the roche index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Roche Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/roche?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/roche?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_roche_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Roche-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"roche\"","tags":["indices"]}},"/v3/index/rockwell":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rockwell index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Rockwell Automation Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rockwell?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rockwell?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_rockwell_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Rockwell-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"rockwell\"","tags":["indices"]}},"/v3/index/rocky":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rocky index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Rocky Linux Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rocky?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rocky?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_rocky_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_Update-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"rocky\"","tags":["indices"]}},"/v3/index/rocky-errata":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rocky-errata index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Rocky Errata\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-errata?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rocky-errata?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_rocky-errata_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_RockyErrata-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"rocky-errata\"","tags":["indices"]}},"/v3/index/rocky-purls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rocky-purls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Rocky Purls\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-purls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rocky-purls?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_rocky-purls_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"rocky-purls\"","tags":["indices"]}},"/v3/index/rsync":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rsync index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Rsync Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rsync?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rsync?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_rsync_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Rsync-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"rsync\"","tags":["indices"]}},"/v3/index/ruckus":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ruckus index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ruckus Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ruckus?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ruckus?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ruckus_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Ruckus-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ruckus\"","tags":["indices"]}},"/v3/index/rustsec-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rustsec-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** RustSec Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rustsec-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rustsec-advisories?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_rustsec-advisories_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_RustsecAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"rustsec-advisories\"","tags":["indices"]}},"/v3/index/sacert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sacert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Saudi CERT\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sacert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sacert?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sacert_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SAAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sacert\"","tags":["indices"]}},"/v3/index/safran":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the safran index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Safran Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/safran?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/safran?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_safran_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Safran-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"safran\"","tags":["indices"]}},"/v3/index/saint":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the saint index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SAINT Exploits\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/saint?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/saint?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_saint_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SaintExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"saint\"","tags":["indices"]}},"/v3/index/salesforce":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the salesforce index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SalesForce Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/salesforce?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/salesforce?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_salesforce_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SalesForce-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"salesforce\"","tags":["indices"]}},"/v3/index/samba":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the samba index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Samba Security Releases\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/samba?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/samba?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_samba_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Samba-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"samba\"","tags":["indices"]}},"/v3/index/sandisk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sandisk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sandisk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sandisk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sandisk?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sandisk_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Sandisk-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sandisk\"","tags":["indices"]}},"/v3/index/sans-dshield":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sans-dshield index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SANS DShield Honeypot Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sans-dshield?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sans-dshield?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sans-dshield_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SansDshield-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sans-dshield\"","tags":["indices"]}},"/v3/index/sap":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sap index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SAP Security Patch Days\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sap?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sap?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sap_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SAP-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sap\"","tags":["indices"]}},"/v3/index/schneider-electric":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the schneider-electric index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Schneider Electric Security Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/schneider-electric?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/schneider-electric?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_schneider-electric_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SchneiderElectricAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"schneider-electric\"","tags":["indices"]}},"/v3/index/schutzwerk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the schutzwerk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Schutzwerk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/schutzwerk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/schutzwerk?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_schutzwerk_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Schutzwerk-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"schutzwerk\"","tags":["indices"]}},"/v3/index/sec-consult":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sec-consult index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SEC Consult Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sec-consult?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sec-consult?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sec-consult_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SECConsult-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sec-consult\"","tags":["indices"]}},"/v3/index/securitylab":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the securitylab index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Security Lab Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/securitylab?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/securitylab?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_securitylab_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SecurityLab-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"securitylab\"","tags":["indices"]}},"/v3/index/seebug":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the seebug index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Seebug Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/seebug?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/seebug?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_seebug_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SeebugExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"seebug\"","tags":["indices"]}},"/v3/index/sel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Schweitzer Engineering Laboratories Security Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sel?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sel_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Sel-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sel\"","tags":["indices"]}},"/v3/index/sentinelone":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sentinelone index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SentinelOne Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sentinelone?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sentinelone?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sentinelone_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SentinelOne-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sentinelone\"","tags":["indices"]}},"/v3/index/servicenow":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the servicenow index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ServiceNow CVE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/servicenow?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/servicenow?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_servicenow_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ServiceNow-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"servicenow\"","tags":["indices"]}},"/v3/index/shadowserver-exploited":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the shadowserver-exploited index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Shadowserver Foundation Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/shadowserver-exploited?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/shadowserver-exploited?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_shadowserver-exploited_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ShadowServerExploitedVulnerability-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"shadowserver-exploited\"","tags":["indices"]}},"/v3/index/shielder":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the shielder index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Shielder Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/shielder?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/shielder?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_shielder_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Shielder-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"shielder\"","tags":["indices"]}},"/v3/index/sick":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sick index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SICK Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sick?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sick?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sick_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Sick-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sick\"","tags":["indices"]}},"/v3/index/siemens":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the siemens index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Siemens Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/siemens?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/siemens?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_siemens_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SiemensAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"siemens\"","tags":["indices"]}},"/v3/index/sierra-wireless":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sierra-wireless index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sierra Wireless Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sierra-wireless?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sierra-wireless?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sierra-wireless_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SierraWireless-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sierra-wireless\"","tags":["indices"]}},"/v3/index/sigmahq-sigma-rules":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sigmahq-sigma-rules index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sigma Rules\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sigmahq-sigma-rules?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sigmahq-sigma-rules?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sigmahq-sigma-rules_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SigmaRule-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sigmahq-sigma-rules\"","tags":["indices"]}},"/v3/index/singcert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the singcert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CSA Alerts and Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/singcert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/singcert?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_singcert_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SingCert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"singcert\"","tags":["indices"]}},"/v3/index/sitecore":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sitecore index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sitecore Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sitecore?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sitecore?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sitecore_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Sitecore-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sitecore\"","tags":["indices"]}},"/v3/index/slackware":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the slackware index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Slackware Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/slackware?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/slackware?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_slackware_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Slackware-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"slackware\"","tags":["indices"]}},"/v3/index/solarwinds":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the solarwinds index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SolarWinds Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/solarwinds?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/solarwinds?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_solarwinds_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SolarWindsAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"solarwinds\"","tags":["indices"]}},"/v3/index/solr":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the solr index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Solr CVE Reports\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/solr?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/solr?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_solr_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Solr-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"solr\"","tags":["indices"]}},"/v3/index/sonatype":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sonatype index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sonatype Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sonatype?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sonatype?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sonatype_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Sonatype-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sonatype\"","tags":["indices"]}},"/v3/index/sonicwall":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sonicwall index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SonicWall Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sonicwall?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sonicwall?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sonicwall_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SonicWallAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sonicwall\"","tags":["indices"]}},"/v3/index/spacelabs-healthcare":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the spacelabs-healthcare index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Spacelabs Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/spacelabs-healthcare?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/spacelabs-healthcare?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_spacelabs-healthcare_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SpacelabsHealthcareAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"spacelabs-healthcare\"","tags":["indices"]}},"/v3/index/splunk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the splunk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Splunk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/splunk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/splunk?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_splunk_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Splunk-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"splunk\"","tags":["indices"]}},"/v3/index/spring":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the spring index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Spring Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/spring?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/spring?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_spring_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Spring-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"spring\"","tags":["indices"]}},"/v3/index/ssd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ssd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SSD Secure Disclosure Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ssd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ssd?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ssd_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SSDAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ssd\"","tags":["indices"]}},"/v3/index/stormshield":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the stormshield index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Stormshield Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/stormshield?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/stormshield?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_stormshield_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Stormshield-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"stormshield\"","tags":["indices"]}},"/v3/index/stryker":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the stryker index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Stryker Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/stryker?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/stryker?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_stryker_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_StrykerAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"stryker\"","tags":["indices"]}},"/v3/index/sudo":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sudo index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sudo Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sudo?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sudo?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_sudo_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Sudo-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"sudo\"","tags":["indices"]}},"/v3/index/suse":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the suse index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SUSE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/suse?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/suse?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_suse_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Cvrf-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"suse\"","tags":["indices"]}},"/v3/index/suse-security":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the suse-security index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Suse Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/suse-security?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/suse-security?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_suse-security_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SuseSecurity-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"suse-security\"","tags":["indices"]}},"/v3/index/swift":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the swift index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Swift packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/swift?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/swift?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_swift_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"swift\"","tags":["indices"]}},"/v3/index/swisslog-healthcare":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the swisslog-healthcare index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Swisslog Healthcare CVE Disclosures\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/swisslog-healthcare?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/swisslog-healthcare?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_swisslog-healthcare_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SwisslogHealthcareAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"swisslog-healthcare\"","tags":["indices"]}},"/v3/index/symfony":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the symfony index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Symfony Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/symfony?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/symfony?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_symfony_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Symfony-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"symfony\"","tags":["indices"]}},"/v3/index/synacktiv":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the synacktiv index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Synacktiv Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/synacktiv?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/synacktiv?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_synacktiv_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Synacktiv-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"synacktiv\"","tags":["indices"]}},"/v3/index/syncrosoft":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the syncrosoft index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SyncroSoft Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/syncrosoft?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/syncrosoft?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_syncrosoft_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SyncroSoft-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"syncrosoft\"","tags":["indices"]}},"/v3/index/synology":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the synology index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Synology Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/synology?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/synology?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_synology_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Synology-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"synology\"","tags":["indices"]}},"/v3/index/syss":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the syss index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Syss Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/syss?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/syss?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_syss_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Syss-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"syss\"","tags":["indices"]}},"/v3/index/tailscale":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the tailscale index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Tailscale Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/tailscale?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/tailscale?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_tailscale_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Tailscale-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"tailscale\"","tags":["indices"]}},"/v3/index/teamviewer":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the teamviewer index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** TeamViewer Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/teamviewer?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/teamviewer?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_teamviewer_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TeamViewer-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"teamviewer\"","tags":["indices"]}},"/v3/index/tenable-research-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the tenable-research-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Tenable Research Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/tenable-research-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/tenable-research-advisories?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_tenable-research-advisories_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TenableResearchAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"tenable-research-advisories\"","tags":["indices"]}},"/v3/index/tencent":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the tencent index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Tencent Vulnerability Risk Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/tencent?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/tencent?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_tencent_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Tencent-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"tencent\"","tags":["indices"]}},"/v3/index/thales":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the thales index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Thales Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/thales?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/thales?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_thales_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Thales-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"thales\"","tags":["indices"]}},"/v3/index/themissinglink":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the themissinglink index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** the missing link Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/themissinglink?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/themissinglink?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_themissinglink_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TheMissingLink-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"themissinglink\"","tags":["indices"]}},"/v3/index/thermo-fisher":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the thermo-fisher index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Thermo Fisher Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/thermo-fisher?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/thermo-fisher?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_thermo-fisher_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ThermoFisher-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"thermo-fisher\"","tags":["indices"]}},"/v3/index/threat-actors":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the threat-actors index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Threat Actors Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/threat-actors?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/threat-actors?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_threat-actors_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ThreatActorWithExternalObjects-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"threat-actors\"","tags":["indices"]}},"/v3/index/ti":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ti index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Texas Instruments Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ti?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ti?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ti_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TI-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ti\"","tags":["indices"]}},"/v3/index/tibco":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the tibco index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** TIBCO Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/tibco?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/tibco?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_tibco_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Tibco-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"tibco\"","tags":["indices"]}},"/v3/index/tp-link":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the tp-link index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** TP-Link Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/tp-link?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/tp-link?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_tp-link_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TPLink-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"tp-link\"","tags":["indices"]}},"/v3/index/trane-technology":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the trane-technology index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Trane Technology Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/trane-technology?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/trane-technology?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_trane-technology_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TraneTechnology-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"trane-technology\"","tags":["indices"]}},"/v3/index/trendmicro":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the trendmicro index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Trend Micro Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/trendmicro?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/trendmicro?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_trendmicro_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TrendMicro-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"trendmicro\"","tags":["indices"]}},"/v3/index/trustwave":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the trustwave index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Trustwave Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/trustwave?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/trustwave?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_trustwave_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Trustwave-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"trustwave\"","tags":["indices"]}},"/v3/index/twcert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the twcert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Taiwan CERT Vulnerability Notes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/twcert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/twcert?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_twcert_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TWCertAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"twcert\"","tags":["indices"]}},"/v3/index/ubiquiti":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ubiquiti index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ubiquiti Security Advisory Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ubiquiti?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ubiquiti?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ubiquiti_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Ubiquiti-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ubiquiti\"","tags":["indices"]}},"/v3/index/ubuntu":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ubuntu index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ubuntu Security Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ubuntu?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ubuntu_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_UbuntuCVE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ubuntu\"","tags":["indices"]}},"/v3/index/ubuntu-purls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ubuntu-purls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ubuntu Purls\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu-purls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ubuntu-purls?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_ubuntu-purls_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"ubuntu-purls\"","tags":["indices"]}},"/v3/index/unify":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the unify index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Unify Product Security Advisories and Security Notes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/unify?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/unify?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_unify_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Unify-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"unify\"","tags":["indices"]}},"/v3/index/unisoc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the unisoc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** UNISOC Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/unisoc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/unisoc?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_unisoc_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Unisoc-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"unisoc\"","tags":["indices"]}},"/v3/index/usd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the usd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** usd Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/usd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/usd?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_usd_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_USD-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"usd\"","tags":["indices"]}},"/v3/index/usom":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the usom index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** USOM Security Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/usom?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/usom?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_usom_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_USOMAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"usom\"","tags":["indices"]}},"/v3/index/vandyke":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vandyke index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VanDyke Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vandyke?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vandyke?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vandyke_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VanDyke-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vandyke\"","tags":["indices"]}},"/v3/index/vapidlabs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vapidlabs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VapidLabs Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vapidlabs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vapidlabs?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vapidlabs_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VapidLabsAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vapidlabs\"","tags":["indices"]}},"/v3/index/vc-cpe-dictionary":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vc-cpe-dictionary index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck CPE Dictionary\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vc-cpe-dictionary?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vc-cpe-dictionary?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vc-cpe-dictionary_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VCCPEDictionary-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vc-cpe-dictionary\"","tags":["indices"]}},"/v3/index/vde":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vde index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VDE CERT Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vde?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vde?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vde_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VDEAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vde\"","tags":["indices"]}},"/v3/index/veeam":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the veeam index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Veeam Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/veeam?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/veeam?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_veeam_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Veeam-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"veeam\"","tags":["indices"]}},"/v3/index/veritas":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the veritas index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Veritas Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/veritas?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/veritas?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_veritas_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Veritas-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"veritas\"","tags":["indices"]}},"/v3/index/virtuozzo":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the virtuozzo index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Virtuozzo Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/virtuozzo?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/virtuozzo?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_virtuozzo_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Virtuozzo-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"virtuozzo\"","tags":["indices"]}},"/v3/index/vlc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vlc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VLC Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vlc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vlc?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vlc_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VLC-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vlc\"","tags":["indices"]}},"/v3/index/vmware":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vmware index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VMWare Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vmware?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vmware?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vmware_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VMWareAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vmware\"","tags":["indices"]}},"/v3/index/voidsec":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the voidsec index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VoidSec Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/voidsec?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/voidsec?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_voidsec_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VoidSec-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"voidsec\"","tags":["indices"]}},"/v3/index/vulncheck":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulncheck_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VulnCheck-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulncheck\"","tags":["indices"]}},"/v3/index/vulncheck-canaries":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Canary Intel\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-canaries?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulncheck-canaries_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"src_country","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"dst_country","schema":{"type":"string"}},{"description":"Source IP address","in":"query","name":"src_ip","schema":{"type":"string"}},{"description":"Source ASN in format AS12345","in":"query","name":"src_asn","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulncheck-canaries\"","tags":["indices"]}},"/v3/index/vulncheck-canaries-10d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-10d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Canary Intel (10 day)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-10d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-canaries-10d?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulncheck-canaries-10d_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"src_country","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"dst_country","schema":{"type":"string"}},{"description":"Source IP address","in":"query","name":"src_ip","schema":{"type":"string"}},{"description":"Source ASN in format AS12345","in":"query","name":"src_asn","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulncheck-canaries-10d\"","tags":["indices"]}},"/v3/index/vulncheck-canaries-30d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-30d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Canary Intel (30 day)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-30d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-canaries-30d?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulncheck-canaries-30d_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"src_country","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"dst_country","schema":{"type":"string"}},{"description":"Source IP address","in":"query","name":"src_ip","schema":{"type":"string"}},{"description":"Source ASN in format AS12345","in":"query","name":"src_asn","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulncheck-canaries-30d\"","tags":["indices"]}},"/v3/index/vulncheck-canaries-3d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-3d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Canary Intel (3 day)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-3d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-canaries-3d?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulncheck-canaries-3d_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"src_country","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"dst_country","schema":{"type":"string"}},{"description":"Source IP address","in":"query","name":"src_ip","schema":{"type":"string"}},{"description":"Source ASN in format AS12345","in":"query","name":"src_asn","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulncheck-canaries-3d\"","tags":["indices"]}},"/v3/index/vulncheck-canaries-90d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-90d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Canary Intel (90 day)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-90d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-canaries-90d?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulncheck-canaries-90d_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"src_country","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"dst_country","schema":{"type":"string"}},{"description":"Source IP address","in":"query","name":"src_ip","schema":{"type":"string"}},{"description":"Source ASN in format AS12345","in":"query","name":"src_asn","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulncheck-canaries-90d\"","tags":["indices"]}},"/v3/index/vulncheck-config":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-config index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Configurations\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-config?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-config?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulncheck-config_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VulnCheckConfig-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulncheck-config\"","tags":["indices"]}},"/v3/index/vulncheck-cvelist-v5":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-cvelist-v5 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck CVEList V5\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-cvelist-v5?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-cvelist-v5?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulncheck-cvelist-v5_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VulnCheckCVEListV5-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulncheck-cvelist-v5\"","tags":["indices"]}},"/v3/index/vulncheck-kev":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-kev index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck KEV\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-kev?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-kev?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulncheck-kev_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VulnCheckKEV-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulncheck-kev\"","tags":["indices"]}},"/v3/index/vulncheck-nvd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-nvd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck NVD\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-nvd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-nvd?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulncheck-nvd_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_CveItemsExtended-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulncheck-nvd\"","tags":["indices"]}},"/v3/index/vulncheck-nvd2":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-nvd2 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck NVD V2\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-nvd2?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-nvd2?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulncheck-nvd2_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_NVD20CVEExtended-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulncheck-nvd2\"","tags":["indices"]}},"/v3/index/vulnerability-aliases":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulnerability-aliases index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Vulnerability Aliases\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulnerability-aliases?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulnerability-aliases?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulnerability-aliases_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_VulnerabilityAlias-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulnerability-aliases\"","tags":["indices"]}},"/v3/index/vulnrichment":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulnrichment index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CISA Vulnrichment\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulnrichment?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulnrichment?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vulnrichment_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Vulnrichment-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vulnrichment\"","tags":["indices"]}},"/v3/index/vyaire":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vyaire index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Vyaire Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vyaire?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vyaire?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_vyaire_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VYAIREAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"vyaire\"","tags":["indices"]}},"/v3/index/watchguard":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the watchguard index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Watchguard Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/watchguard?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/watchguard?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_watchguard_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_WatchGuard-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"watchguard\"","tags":["indices"]}},"/v3/index/whatsapp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the whatsapp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** WhatsApp Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/whatsapp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/whatsapp?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_whatsapp_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_WhatsApp-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"whatsapp\"","tags":["indices"]}},"/v3/index/wibu":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the wibu index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Wibu Systems Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/wibu?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/wibu?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_wibu_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Wibu-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"wibu\"","tags":["indices"]}},"/v3/index/wireshark":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the wireshark index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Wireshark Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/wireshark?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/wireshark?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_wireshark_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Wireshark-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"wireshark\"","tags":["indices"]}},"/v3/index/with-secure":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the with-secure index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** With Secure Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/with-secure?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/with-secure?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_with-secure_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_WithSecure-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"with-secure\"","tags":["indices"]}},"/v3/index/wolfi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the wolfi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Wolfi Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/wolfi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/wolfi?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_wolfi_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Wolfi-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"wolfi\"","tags":["indices"]}},"/v3/index/wolfssl":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the wolfssl index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** WolfSSL Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/wolfssl?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/wolfssl?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_wolfssl_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_WolfSSL-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"wolfssl\"","tags":["indices"]}},"/v3/index/wordfence":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the wordfence index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Wordfence Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/wordfence?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/wordfence?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_wordfence_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Wordfence-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"wordfence\"","tags":["indices"]}},"/v3/index/xen":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the xen index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Xen Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/xen?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/xen?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_xen_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Xen-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"xen\"","tags":["indices"]}},"/v3/index/xerox":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the xerox index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Xerox Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/xerox?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/xerox?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_xerox_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Xerox-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"xerox\"","tags":["indices"]}},"/v3/index/xiaomi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the xiaomi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Xiaomi Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/xiaomi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/xiaomi?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_xiaomi_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Xiaomi-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"xiaomi\"","tags":["indices"]}},"/v3/index/xylem":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the xylem index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Xylem Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/xylem?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/xylem?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_xylem_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Xylem-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"xylem\"","tags":["indices"]}},"/v3/index/yamaha":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the yamaha index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Yamaha Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/yamaha?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/yamaha?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_yamaha_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Yamaha-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"yamaha\"","tags":["indices"]}},"/v3/index/yokogawa":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the yokogawa index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Yokogawa Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/yokogawa?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/yokogawa?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_yokogawa_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_YokogawaAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"yokogawa\"","tags":["indices"]}},"/v3/index/yubico":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the yubico index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Yubico Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/yubico?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/yubico?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_yubico_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Yubico-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"yubico\"","tags":["indices"]}},"/v3/index/zdi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zdi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zero Day Initiative Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zdi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zdi?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_zdi_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ZeroDayAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"zdi\"","tags":["indices"]}},"/v3/index/zebra":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zebra index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zebra Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zebra?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zebra?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_zebra_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Zebra-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"zebra\"","tags":["indices"]}},"/v3/index/zebra-eol":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zebra-eol index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zebra End of Life Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zebra-eol?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zebra-eol?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_zebra-eol_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GenericEOL-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"zebra-eol\"","tags":["indices"]}},"/v3/index/zeroscience":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zeroscience index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ZeroScience Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zeroscience?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zeroscience?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_zeroscience_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ZeroScienceAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"zeroscience\"","tags":["indices"]}},"/v3/index/zimbra":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zimbra index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zimbra Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zimbra?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zimbra?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_zimbra_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Zimbra-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"zimbra\"","tags":["indices"]}},"/v3/index/zoom":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zoom index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zoom Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zoom?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zoom?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_zoom_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Zoom-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"zoom\"","tags":["indices"]}},"/v3/index/zscaler":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zscaler index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zscaler Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zscaler?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zscaler?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_zscaler_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Zscaler-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"zscaler\"","tags":["indices"]}},"/v3/index/zuso":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zuso index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ZUSO Vulnerability Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zuso?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zuso?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_zuso_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Zuso-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"zuso\"","tags":["indices"]}},"/v3/index/zyxel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zyxel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zyxel Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zyxel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zyxel?cursor=\u003cnext_cursor_id\u003e`\n","operationId":"index_zyxel_get","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Zyxel-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return vulnerability data stored in index \"zyxel\"","tags":["indices"]}},"/v3/openapi":{"get":{"description":"Return the VulnCheck API (v3) OpenAPI specification","operationId":"openapi_get","responses":{"200":{"content":{"application/json":{"schema":{"additionalProperties":{},"type":"object"}}},"description":"OK"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Return OpenAPI specification","tags":["endpoints"]}},"/v3/pdns/vulncheck-c2":{"get":{"description":"Retrieve a list of hostnames, identified as running Command \u0026 Control infrastructure.","operationId":"pdns_vulncheck-c2_get","parameters":[{"description":"Format of the Hostnames in the response (Defaults To: text)","in":"query","name":"format","schema":{"enum":["txt","json","text"],"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Retrieve a list of C2 Hostnames","tags":["endpoints"]}},"/v3/purl":{"get":{"description":"Based on the specified PURL, this endpoint will return a list of vulnerabilities that are related to the package. We currently support hex, golang, hackage, npm, and pypi","operationId":"purl_get","parameters":[{"description":"URL string used to identify and locate a software package","in":"query","name":"purl","required":true,"schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-v3controllers_PurlResponseData-v3controllers_PurlResponseMetadata"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Request vulnerabilities related to a PURL","tags":["endpoints"]}},"/v3/purls":{"post":{"description":"Accepts a JSON array of PURLs in the request body and returns a list of vulnerabilities","operationId":"purls_post","requestBody":{"content":{"application/json":{"schema":{"items":{"type":"string"},"title":"purls","type":"array"}}},"description":"PURL strings used to identify and locate software packages","required":true},"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-v3controllers_PurlsResponseData-v3controllers_PurlsResponseMetadata"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Request vulnerabilities related to a list of PURLs","tags":["endpoints"]}},"/v3/rules/initial-access/{type}":{"get":{"description":"Retrieve set of initial-access detection rules by type","operationId":"rules_initial-access_type_get","parameters":[{"description":"Type of ruleset to retrieve","in":"path","name":"type","required":true,"schema":{"enum":["snort","suricata"],"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Retrieve set of initial-access detection rules","tags":["endpoints"]}},"/v3/tags/vulncheck-c2":{"get":{"description":"Retrieve a list of IP addresses, identified as running Command \u0026 Control infrastructure","operationId":"tags_vulncheck-c2_get","parameters":[{"description":"Format of the IP Addresses in the response (Defaults To: text)","in":"query","name":"format","schema":{"enum":["txt","json","text"],"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Retrieve a list of C2 IP addresses","tags":["endpoints"]}},"/v4/advisory":{"get":{"description":"Query the VulnCheck v4 advisory index","operationId":"v4QueryAdvisories","parameters":[{"description":"Filter by advisory feed name (e.g. 'vulncheck')","in":"query","name":"name","schema":{"type":"string"}},{"description":"Filter by CVE ID (e.g. 'CVE-2024-1234')","in":"query","name":"cve_id","schema":{"type":"string"}},{"description":"Filter by vendor name","in":"query","name":"vendor","schema":{"type":"string"}},{"description":"Filter by product name","in":"query","name":"product","schema":{"type":"string"}},{"description":"Filter by OS/platform","in":"query","name":"platform","schema":{"type":"string"}},{"description":"Filter by product version (semver-aware)","in":"query","name":"version","schema":{"type":"string"}},{"description":"Filter by CPE (e.g. 'cpe:2.3:a:vendor:product:*')","in":"query","name":"cpe","schema":{"type":"string"}},{"description":"Filter by package name","in":"query","name":"package_name","schema":{"type":"string"}},{"description":"Filter by package URL (PURL)","in":"query","name":"purl","schema":{"type":"string"}},{"description":"Filter by reference URL","in":"query","name":"reference_url","schema":{"type":"string"}},{"description":"Filter by reference tag (e.g. 'patch', 'advisory')","in":"query","name":"reference_tag","schema":{"type":"string"}},{"description":"Filter by description language (e.g. 'en')","in":"query","name":"description_lang","schema":{"type":"string"}},{"description":"Return advisories updated after this date (RFC3339 or date-math e.g. 'now-30d')","in":"query","name":"updatedAfter","schema":{"type":"string"}},{"description":"Return advisories updated before this date (RFC3339 or date-math)","in":"query","name":"updatedBefore","schema":{"type":"string"}},{"description":"Page number (default: 1)","in":"query","name":"page","schema":{"type":"integer"}},{"description":"Results per page, max 100 (default: 10)","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"Presence activates cursor mode from the first page (value is ignored; cannot be combined with page)","in":"query","name":"start_cursor","schema":{"type":"string"}},{"description":"Cursor from previous response _meta.next_cursor to fetch the next page","in":"query","name":"cursor","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/search.V4AdvisoryReturnValue"}}},"description":"OK"},"400":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/search.ErrorResponse"}}},"description":"Bad Request"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/search.ErrorResponse"}}},"description":"Unauthorized"},"402":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/search.ErrorResponse"}}},"description":"Payment Required"},"503":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/search.ErrorResponse"}}},"description":"Service Unavailable"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Query advisories","tags":["advisory"]}},"/v4/advisory/list":{"get":{"description":"Return a list of available advisory feed names","operationId":"v4ListAdvisoryFeeds","responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/search.V4ListFeedReturnValue"}}},"description":"OK"},"400":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/search.ErrorResponse"}}},"description":"Bad Request"},"401":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/search.ErrorResponse"}}},"description":"Unauthorized"},"402":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/search.ErrorResponse"}}},"description":"Payment Required"},"503":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/search.ErrorResponse"}}},"description":"Service Unavailable"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"List advisory feeds","tags":["advisory"]}},"/v4/backup":{"get":{"description":"Returns the list of advisory feeds for which a backup can be requested","operationId":"v4ListBackups","responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/backup.ListBackupsResponse"}}},"description":"OK"},"401":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Unauthorized"},"503":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Service Unavailable"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"List available backups","tags":["backup"]}},"/v4/backup/{index}":{"get":{"description":"Validates the feed, generates a fresh backup zip if the source parquet is newer, and returns a pre-signed download URL","operationId":"v4GetBackupByName","parameters":[{"description":"Feed name (e.g. 'vulncheck')","in":"path","name":"index","required":true,"schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/backup.BackupResponse"}}},"description":"OK"},"401":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Unauthorized"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"503":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Service Unavailable"}},"security":[{"Bearer":[]}],"servers":[{"url":"https://api.vulncheck.com"}],"summary":"Get backup by feed name","tags":["backup"]}}},"servers":[{"url":"https://api.vulncheck.com"}]} \ No newline at end of file diff --git a/pyproject.toml b/pyproject.toml index e5ba81d3..9c3d8e36 100644 --- a/pyproject.toml +++ b/pyproject.toml @@ -1,6 +1,6 @@ [project] name = "vulncheck_sdk" -version = "0.0.45" +version = "0.0.46" description = "VulnCheck API" authors = [ {name = "VulnCheck API Support",email = "support@vulncheck.com"}, diff --git a/python-generator-config.yaml b/python-generator-config.yaml index a82c1925..a47cb1c3 100644 --- a/python-generator-config.yaml +++ b/python-generator-config.yaml @@ -2,4 +2,4 @@ additionalProperties: projectName: "vulncheck-sdk" packageName: "vulncheck_sdk" packageUrl: "https://github.com/vulncheck-oss/sdk-python/tree/main" - packageVersion: "0.0.45" + packageVersion: "0.0.46" diff --git a/setup.py b/setup.py index 8d38c29c..cd7bbb8d 100644 --- a/setup.py +++ b/setup.py @@ -22,7 +22,7 @@ # prerequisite: setuptools # http://pypi.python.org/pypi/setuptools NAME = "vulncheck-sdk" -VERSION = "0.0.45" +VERSION = "0.0.46" PYTHON_REQUIRES = ">= 3.9" REQUIRES = [ "aiohttp_retry >= 2.8.3", diff --git a/test/aio/test_api_vuln_check_canary.py b/test/aio/test_api_vuln_check_canary.py index 97e65bb7..ee9513c0 100644 --- a/test/aio/test_api_vuln_check_canary.py +++ b/test/aio/test_api_vuln_check_canary.py @@ -53,6 +53,9 @@ def make_instance(self, include_optional) -> ApiVulnCheckCanary: severity = 56, signature = '', signature_id = 56, + src_as_domain = '', + src_as_name = '', + src_asn = '', src_country = '', src_ip = '', src_port = 56, diff --git a/test/aio/test_indices_api.py b/test/aio/test_indices_api.py index 6a1800fa..0468d8b9 100644 --- a/test/aio/test_indices_api.py +++ b/test/aio/test_indices_api.py @@ -1539,6 +1539,13 @@ async def test_index_honeywell_get(self) -> None: """ pass + async def test_index_hp_eol_get(self) -> None: + """Test case for index_hp_eol_get + + Return vulnerability data stored in index \"hp-eol\" + """ + pass + async def test_index_hp_get(self) -> None: """Test case for index_hp_get @@ -1546,6 +1553,13 @@ async def test_index_hp_get(self) -> None: """ pass + async def test_index_hpe_eol_get(self) -> None: + """Test case for index_hpe_eol_get + + Return vulnerability data stored in index \"hpe-eol\" + """ + pass + async def test_index_hpe_get(self) -> None: """Test case for index_hpe_get diff --git a/test/aio/test_render_response_with_metadata_array_api_vuln_check_canary_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_api_vuln_check_canary_paginate_pagination.py index 03776cfa..dae27260 100644 --- a/test/aio/test_render_response_with_metadata_array_api_vuln_check_canary_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_api_vuln_check_canary_paginate_pagination.py @@ -90,6 +90,9 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayApiV severity = 56, signature = '', signature_id = 56, + src_as_domain = '', + src_as_name = '', + src_asn = '', src_country = '', src_ip = '', src_port = 56, diff --git a/test/blocking/test_api_vuln_check_canary.py b/test/blocking/test_api_vuln_check_canary.py index 1aedcd8f..6a76689c 100644 --- a/test/blocking/test_api_vuln_check_canary.py +++ b/test/blocking/test_api_vuln_check_canary.py @@ -53,6 +53,9 @@ def make_instance(self, include_optional) -> ApiVulnCheckCanary: severity = 56, signature = '', signature_id = 56, + src_as_domain = '', + src_as_name = '', + src_asn = '', src_country = '', src_ip = '', src_port = 56, diff --git a/test/blocking/test_indices_api.py b/test/blocking/test_indices_api.py index 73e803c6..98c44b05 100644 --- a/test/blocking/test_indices_api.py +++ b/test/blocking/test_indices_api.py @@ -1539,6 +1539,13 @@ def test_index_honeywell_get(self) -> None: """ pass + def test_index_hp_eol_get(self) -> None: + """Test case for index_hp_eol_get + + Return vulnerability data stored in index \"hp-eol\" + """ + pass + def test_index_hp_get(self) -> None: """Test case for index_hp_get @@ -1546,6 +1553,13 @@ def test_index_hp_get(self) -> None: """ pass + def test_index_hpe_eol_get(self) -> None: + """Test case for index_hpe_eol_get + + Return vulnerability data stored in index \"hpe-eol\" + """ + pass + def test_index_hpe_get(self) -> None: """Test case for index_hpe_get diff --git a/test/blocking/test_render_response_with_metadata_array_api_vuln_check_canary_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_api_vuln_check_canary_paginate_pagination.py index 54d817b3..a8c39d80 100644 --- a/test/blocking/test_render_response_with_metadata_array_api_vuln_check_canary_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_api_vuln_check_canary_paginate_pagination.py @@ -90,6 +90,9 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayApiV severity = 56, signature = '', signature_id = 56, + src_as_domain = '', + src_as_name = '', + src_asn = '', src_country = '', src_ip = '', src_port = 56, diff --git a/vulncheck_sdk/__init__.py b/vulncheck_sdk/__init__.py index 6fa10d3d..d0236a6c 100644 --- a/vulncheck_sdk/__init__.py +++ b/vulncheck_sdk/__init__.py @@ -15,7 +15,7 @@ """ # noqa: E501 -__version__ = "0.0.45" +__version__ = "0.0.46" # Define package exports __all__ = [ diff --git a/vulncheck_sdk/aio/__init__.py b/vulncheck_sdk/aio/__init__.py index 16d194be..9d19bfa2 100644 --- a/vulncheck_sdk/aio/__init__.py +++ b/vulncheck_sdk/aio/__init__.py @@ -15,7 +15,7 @@ """ # noqa: E501 -__version__ = "0.0.45" +__version__ = "0.0.46" # Define package exports __all__ = [ diff --git a/vulncheck_sdk/aio/api/indices_api.py b/vulncheck_sdk/aio/api/indices_api.py index 415ae755..4798d2e3 100644 --- a/vulncheck_sdk/aio/api/indices_api.py +++ b/vulncheck_sdk/aio/api/indices_api.py @@ -143710,7 +143710,7 @@ def _index_honeywell_get_serialize( @validate_call - async def index_hp_get( + async def index_hp_eol_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -143748,10 +143748,10 @@ async def index_hp_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination: - """Return vulnerability data stored in index \"hp\" + ) -> RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination: + """Return vulnerability data stored in index \"hp-eol\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the hp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** HP Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/hp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/hp?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the hp-eol index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** End of Life Data for Hewlett-Packard Products ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/hp-eol?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/hp-eol?cursor=` :param page: set the page number of the response :type page: int @@ -143823,7 +143823,7 @@ async def index_hp_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_hp_get_serialize( + _param = self._index_hp_eol_get_serialize( page=page, limit=limit, cursor=cursor, @@ -143855,7 +143855,7 @@ async def index_hp_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination", '404': "str", '500': "str", } @@ -143871,7 +143871,7 @@ async def index_hp_get( @validate_call - async def index_hp_get_with_http_info( + async def index_hp_eol_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -143909,10 +143909,10 @@ async def index_hp_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination]: - """Return vulnerability data stored in index \"hp\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination]: + """Return vulnerability data stored in index \"hp-eol\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the hp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** HP Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/hp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/hp?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the hp-eol index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** End of Life Data for Hewlett-Packard Products ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/hp-eol?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/hp-eol?cursor=` :param page: set the page number of the response :type page: int @@ -143984,7 +143984,7 @@ async def index_hp_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_hp_get_serialize( + _param = self._index_hp_eol_get_serialize( page=page, limit=limit, cursor=cursor, @@ -144016,7 +144016,7 @@ async def index_hp_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination", '404': "str", '500': "str", } @@ -144032,7 +144032,7 @@ async def index_hp_get_with_http_info( @validate_call - async def index_hp_get_without_preload_content( + async def index_hp_eol_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -144071,9 +144071,9 @@ async def index_hp_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"hp\" + """Return vulnerability data stored in index \"hp-eol\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the hp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** HP Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/hp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/hp?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the hp-eol index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** End of Life Data for Hewlett-Packard Products ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/hp-eol?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/hp-eol?cursor=` :param page: set the page number of the response :type page: int @@ -144145,7 +144145,7 @@ async def index_hp_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_hp_get_serialize( + _param = self._index_hp_eol_get_serialize( page=page, limit=limit, cursor=cursor, @@ -144177,7 +144177,7 @@ async def index_hp_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination", '404': "str", '500': "str", } @@ -144188,7 +144188,7 @@ async def index_hp_get_without_preload_content( return response_data.response - def _index_hp_get_serialize( + def _index_hp_eol_get_serialize( self, page, limit, @@ -144356,7 +144356,7 @@ def _index_hp_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/hp', + resource_path='/v3/index/hp-eol', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -144373,7 +144373,7 @@ def _index_hp_get_serialize( @validate_call - async def index_hpe_get( + async def index_hp_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -144411,10 +144411,10 @@ async def index_hpe_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination: - """Return vulnerability data stored in index \"hpe\" + ) -> RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination: + """Return vulnerability data stored in index \"hp\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the hpe index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** HPE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/hpe?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/hpe?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the hp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** HP Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/hp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/hp?cursor=` :param page: set the page number of the response :type page: int @@ -144486,7 +144486,7 @@ async def index_hpe_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_hpe_get_serialize( + _param = self._index_hp_get_serialize( page=page, limit=limit, cursor=cursor, @@ -144518,7 +144518,7 @@ async def index_hpe_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination", '404': "str", '500': "str", } @@ -144534,7 +144534,7 @@ async def index_hpe_get( @validate_call - async def index_hpe_get_with_http_info( + async def index_hp_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -144572,10 +144572,10 @@ async def index_hpe_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination]: - """Return vulnerability data stored in index \"hpe\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination]: + """Return vulnerability data stored in index \"hp\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the hpe index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** HPE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/hpe?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/hpe?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the hp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** HP Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/hp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/hp?cursor=` :param page: set the page number of the response :type page: int @@ -144647,7 +144647,7 @@ async def index_hpe_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_hpe_get_serialize( + _param = self._index_hp_get_serialize( page=page, limit=limit, cursor=cursor, @@ -144679,7 +144679,7 @@ async def index_hpe_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination", '404': "str", '500': "str", } @@ -144695,7 +144695,7 @@ async def index_hpe_get_with_http_info( @validate_call - async def index_hpe_get_without_preload_content( + async def index_hp_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -144734,9 +144734,9 @@ async def index_hpe_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"hpe\" + """Return vulnerability data stored in index \"hp\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the hpe index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** HPE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/hpe?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/hpe?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the hp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** HP Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/hp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/hp?cursor=` :param page: set the page number of the response :type page: int @@ -144808,7 +144808,7 @@ async def index_hpe_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_hpe_get_serialize( + _param = self._index_hp_get_serialize( page=page, limit=limit, cursor=cursor, @@ -144840,7 +144840,7 @@ async def index_hpe_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination", '404': "str", '500': "str", } @@ -144851,7 +144851,7 @@ async def index_hpe_get_without_preload_content( return response_data.response - def _index_hpe_get_serialize( + def _index_hp_get_serialize( self, page, limit, @@ -145019,7 +145019,7 @@ def _index_hpe_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/hpe', + resource_path='/v3/index/hp', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -145036,7 +145036,7 @@ def _index_hpe_get_serialize( @validate_call - async def index_huawei_euleros_get( + async def index_hpe_eol_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -145074,10 +145074,10 @@ async def index_huawei_euleros_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryHuaweiEulerOSPaginatePagination: - """Return vulnerability data stored in index \"huawei-euleros\" + ) -> RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination: + """Return vulnerability data stored in index \"hpe-eol\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-euleros index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenEuler Operating System Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-euleros?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-euleros?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the hpe-eol index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Hewlett-Packard Enterprise End of Life Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/hpe-eol?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/hpe-eol?cursor=` :param page: set the page number of the response :type page: int @@ -145149,7 +145149,7 @@ async def index_huawei_euleros_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_huawei_euleros_get_serialize( + _param = self._index_hpe_eol_get_serialize( page=page, limit=limit, cursor=cursor, @@ -145181,7 +145181,7 @@ async def index_huawei_euleros_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiEulerOSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination", '404': "str", '500': "str", } @@ -145197,7 +145197,7 @@ async def index_huawei_euleros_get( @validate_call - async def index_huawei_euleros_get_with_http_info( + async def index_hpe_eol_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -145235,10 +145235,10 @@ async def index_huawei_euleros_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHuaweiEulerOSPaginatePagination]: - """Return vulnerability data stored in index \"huawei-euleros\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination]: + """Return vulnerability data stored in index \"hpe-eol\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-euleros index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenEuler Operating System Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-euleros?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-euleros?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the hpe-eol index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Hewlett-Packard Enterprise End of Life Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/hpe-eol?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/hpe-eol?cursor=` :param page: set the page number of the response :type page: int @@ -145310,7 +145310,7 @@ async def index_huawei_euleros_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_huawei_euleros_get_serialize( + _param = self._index_hpe_eol_get_serialize( page=page, limit=limit, cursor=cursor, @@ -145342,7 +145342,7 @@ async def index_huawei_euleros_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiEulerOSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination", '404': "str", '500': "str", } @@ -145358,7 +145358,7 @@ async def index_huawei_euleros_get_with_http_info( @validate_call - async def index_huawei_euleros_get_without_preload_content( + async def index_hpe_eol_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -145397,9 +145397,9 @@ async def index_huawei_euleros_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"huawei-euleros\" + """Return vulnerability data stored in index \"hpe-eol\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-euleros index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenEuler Operating System Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-euleros?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-euleros?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the hpe-eol index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Hewlett-Packard Enterprise End of Life Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/hpe-eol?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/hpe-eol?cursor=` :param page: set the page number of the response :type page: int @@ -145471,7 +145471,7 @@ async def index_huawei_euleros_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_huawei_euleros_get_serialize( + _param = self._index_hpe_eol_get_serialize( page=page, limit=limit, cursor=cursor, @@ -145503,7 +145503,7 @@ async def index_huawei_euleros_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiEulerOSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination", '404': "str", '500': "str", } @@ -145514,7 +145514,7 @@ async def index_huawei_euleros_get_without_preload_content( return response_data.response - def _index_huawei_euleros_get_serialize( + def _index_hpe_eol_get_serialize( self, page, limit, @@ -145682,7 +145682,7 @@ def _index_huawei_euleros_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/huawei-euleros', + resource_path='/v3/index/hpe-eol', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -145699,7 +145699,7 @@ def _index_huawei_euleros_get_serialize( @validate_call - async def index_huawei_ips_get( + async def index_hpe_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -145737,10 +145737,10 @@ async def index_huawei_ips_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryHuaweiIPSPaginatePagination: - """Return vulnerability data stored in index \"huawei-ips\" + ) -> RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination: + """Return vulnerability data stored in index \"hpe\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-ips index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Huawei IPS Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-ips?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-ips?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the hpe index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** HPE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/hpe?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/hpe?cursor=` :param page: set the page number of the response :type page: int @@ -145812,7 +145812,7 @@ async def index_huawei_ips_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_huawei_ips_get_serialize( + _param = self._index_hpe_get_serialize( page=page, limit=limit, cursor=cursor, @@ -145844,7 +145844,7 @@ async def index_huawei_ips_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiIPSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination", '404': "str", '500': "str", } @@ -145860,7 +145860,7 @@ async def index_huawei_ips_get( @validate_call - async def index_huawei_ips_get_with_http_info( + async def index_hpe_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -145898,10 +145898,10 @@ async def index_huawei_ips_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHuaweiIPSPaginatePagination]: - """Return vulnerability data stored in index \"huawei-ips\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination]: + """Return vulnerability data stored in index \"hpe\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-ips index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Huawei IPS Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-ips?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-ips?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the hpe index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** HPE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/hpe?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/hpe?cursor=` :param page: set the page number of the response :type page: int @@ -145973,7 +145973,7 @@ async def index_huawei_ips_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_huawei_ips_get_serialize( + _param = self._index_hpe_get_serialize( page=page, limit=limit, cursor=cursor, @@ -146005,7 +146005,7 @@ async def index_huawei_ips_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiIPSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination", '404': "str", '500': "str", } @@ -146021,7 +146021,7 @@ async def index_huawei_ips_get_with_http_info( @validate_call - async def index_huawei_ips_get_without_preload_content( + async def index_hpe_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -146060,9 +146060,9 @@ async def index_huawei_ips_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"huawei-ips\" + """Return vulnerability data stored in index \"hpe\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-ips index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Huawei IPS Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-ips?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-ips?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the hpe index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** HPE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/hpe?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/hpe?cursor=` :param page: set the page number of the response :type page: int @@ -146134,7 +146134,7 @@ async def index_huawei_ips_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_huawei_ips_get_serialize( + _param = self._index_hpe_get_serialize( page=page, limit=limit, cursor=cursor, @@ -146166,7 +146166,7 @@ async def index_huawei_ips_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiIPSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination", '404': "str", '500': "str", } @@ -146177,7 +146177,7 @@ async def index_huawei_ips_get_without_preload_content( return response_data.response - def _index_huawei_ips_get_serialize( + def _index_hpe_get_serialize( self, page, limit, @@ -146345,7 +146345,7 @@ def _index_huawei_ips_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/huawei-ips', + resource_path='/v3/index/hpe', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -146362,7 +146362,7 @@ def _index_huawei_ips_get_serialize( @validate_call - async def index_huawei_psirt_get( + async def index_huawei_euleros_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -146400,10 +146400,10 @@ async def index_huawei_psirt_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryHuaweiPaginatePagination: - """Return vulnerability data stored in index \"huawei-psirt\" + ) -> RenderResponseWithMetadataArrayAdvisoryHuaweiEulerOSPaginatePagination: + """Return vulnerability data stored in index \"huawei-euleros\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-psirt index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Huawei Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-psirt?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-psirt?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-euleros index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenEuler Operating System Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-euleros?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-euleros?cursor=` :param page: set the page number of the response :type page: int @@ -146475,7 +146475,7 @@ async def index_huawei_psirt_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_huawei_psirt_get_serialize( + _param = self._index_huawei_euleros_get_serialize( page=page, limit=limit, cursor=cursor, @@ -146507,7 +146507,7 @@ async def index_huawei_psirt_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiEulerOSPaginatePagination", '404': "str", '500': "str", } @@ -146523,7 +146523,7 @@ async def index_huawei_psirt_get( @validate_call - async def index_huawei_psirt_get_with_http_info( + async def index_huawei_euleros_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -146561,10 +146561,10 @@ async def index_huawei_psirt_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHuaweiPaginatePagination]: - """Return vulnerability data stored in index \"huawei-psirt\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHuaweiEulerOSPaginatePagination]: + """Return vulnerability data stored in index \"huawei-euleros\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-psirt index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Huawei Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-psirt?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-psirt?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-euleros index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenEuler Operating System Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-euleros?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-euleros?cursor=` :param page: set the page number of the response :type page: int @@ -146636,7 +146636,7 @@ async def index_huawei_psirt_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_huawei_psirt_get_serialize( + _param = self._index_huawei_euleros_get_serialize( page=page, limit=limit, cursor=cursor, @@ -146668,7 +146668,7 @@ async def index_huawei_psirt_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiEulerOSPaginatePagination", '404': "str", '500': "str", } @@ -146684,7 +146684,7 @@ async def index_huawei_psirt_get_with_http_info( @validate_call - async def index_huawei_psirt_get_without_preload_content( + async def index_huawei_euleros_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -146723,9 +146723,9 @@ async def index_huawei_psirt_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"huawei-psirt\" + """Return vulnerability data stored in index \"huawei-euleros\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-psirt index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Huawei Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-psirt?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-psirt?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-euleros index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenEuler Operating System Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-euleros?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-euleros?cursor=` :param page: set the page number of the response :type page: int @@ -146797,7 +146797,7 @@ async def index_huawei_psirt_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_huawei_psirt_get_serialize( + _param = self._index_huawei_euleros_get_serialize( page=page, limit=limit, cursor=cursor, @@ -146829,7 +146829,7 @@ async def index_huawei_psirt_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiEulerOSPaginatePagination", '404': "str", '500': "str", } @@ -146840,7 +146840,7 @@ async def index_huawei_psirt_get_without_preload_content( return response_data.response - def _index_huawei_psirt_get_serialize( + def _index_huawei_euleros_get_serialize( self, page, limit, @@ -147008,7 +147008,7 @@ def _index_huawei_psirt_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/huawei-psirt', + resource_path='/v3/index/huawei-euleros', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -147025,7 +147025,7 @@ def _index_huawei_psirt_get_serialize( @validate_call - async def index_iava_get( + async def index_huawei_ips_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -147063,10 +147063,10 @@ async def index_iava_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryIAVAPaginatePagination: - """Return vulnerability data stored in index \"iava\" + ) -> RenderResponseWithMetadataArrayAdvisoryHuaweiIPSPaginatePagination: + """Return vulnerability data stored in index \"huawei-ips\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the iava index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Information Assurance Vulnerability Alerts (IAVA) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/iava?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/iava?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-ips index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Huawei IPS Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-ips?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-ips?cursor=` :param page: set the page number of the response :type page: int @@ -147138,7 +147138,7 @@ async def index_iava_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_iava_get_serialize( + _param = self._index_huawei_ips_get_serialize( page=page, limit=limit, cursor=cursor, @@ -147170,7 +147170,7 @@ async def index_iava_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIAVAPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiIPSPaginatePagination", '404': "str", '500': "str", } @@ -147186,7 +147186,7 @@ async def index_iava_get( @validate_call - async def index_iava_get_with_http_info( + async def index_huawei_ips_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -147224,10 +147224,10 @@ async def index_iava_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIAVAPaginatePagination]: - """Return vulnerability data stored in index \"iava\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHuaweiIPSPaginatePagination]: + """Return vulnerability data stored in index \"huawei-ips\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the iava index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Information Assurance Vulnerability Alerts (IAVA) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/iava?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/iava?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-ips index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Huawei IPS Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-ips?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-ips?cursor=` :param page: set the page number of the response :type page: int @@ -147299,7 +147299,7 @@ async def index_iava_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_iava_get_serialize( + _param = self._index_huawei_ips_get_serialize( page=page, limit=limit, cursor=cursor, @@ -147331,7 +147331,7 @@ async def index_iava_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIAVAPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiIPSPaginatePagination", '404': "str", '500': "str", } @@ -147347,7 +147347,7 @@ async def index_iava_get_with_http_info( @validate_call - async def index_iava_get_without_preload_content( + async def index_huawei_ips_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -147386,9 +147386,9 @@ async def index_iava_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"iava\" + """Return vulnerability data stored in index \"huawei-ips\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the iava index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Information Assurance Vulnerability Alerts (IAVA) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/iava?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/iava?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-ips index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Huawei IPS Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-ips?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-ips?cursor=` :param page: set the page number of the response :type page: int @@ -147460,7 +147460,7 @@ async def index_iava_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_iava_get_serialize( + _param = self._index_huawei_ips_get_serialize( page=page, limit=limit, cursor=cursor, @@ -147492,7 +147492,7 @@ async def index_iava_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIAVAPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiIPSPaginatePagination", '404': "str", '500': "str", } @@ -147503,7 +147503,7 @@ async def index_iava_get_without_preload_content( return response_data.response - def _index_iava_get_serialize( + def _index_huawei_ips_get_serialize( self, page, limit, @@ -147671,7 +147671,7 @@ def _index_iava_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/iava', + resource_path='/v3/index/huawei-ips', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -147688,7 +147688,7 @@ def _index_iava_get_serialize( @validate_call - async def index_ibm_get( + async def index_huawei_psirt_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -147726,10 +147726,10 @@ async def index_ibm_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryIBMPaginatePagination: - """Return vulnerability data stored in index \"ibm\" + ) -> RenderResponseWithMetadataArrayAdvisoryHuaweiPaginatePagination: + """Return vulnerability data stored in index \"huawei-psirt\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ibm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** IBM Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ibm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ibm?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-psirt index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Huawei Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-psirt?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-psirt?cursor=` :param page: set the page number of the response :type page: int @@ -147801,7 +147801,7 @@ async def index_ibm_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ibm_get_serialize( + _param = self._index_huawei_psirt_get_serialize( page=page, limit=limit, cursor=cursor, @@ -147833,7 +147833,7 @@ async def index_ibm_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIBMPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiPaginatePagination", '404': "str", '500': "str", } @@ -147849,7 +147849,7 @@ async def index_ibm_get( @validate_call - async def index_ibm_get_with_http_info( + async def index_huawei_psirt_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -147887,10 +147887,10 @@ async def index_ibm_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIBMPaginatePagination]: - """Return vulnerability data stored in index \"ibm\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHuaweiPaginatePagination]: + """Return vulnerability data stored in index \"huawei-psirt\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ibm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** IBM Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ibm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ibm?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-psirt index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Huawei Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-psirt?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-psirt?cursor=` :param page: set the page number of the response :type page: int @@ -147962,7 +147962,7 @@ async def index_ibm_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ibm_get_serialize( + _param = self._index_huawei_psirt_get_serialize( page=page, limit=limit, cursor=cursor, @@ -147994,7 +147994,7 @@ async def index_ibm_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIBMPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiPaginatePagination", '404': "str", '500': "str", } @@ -148010,7 +148010,7 @@ async def index_ibm_get_with_http_info( @validate_call - async def index_ibm_get_without_preload_content( + async def index_huawei_psirt_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -148049,9 +148049,9 @@ async def index_ibm_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ibm\" + """Return vulnerability data stored in index \"huawei-psirt\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ibm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** IBM Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ibm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ibm?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-psirt index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Huawei Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-psirt?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-psirt?cursor=` :param page: set the page number of the response :type page: int @@ -148123,7 +148123,7 @@ async def index_ibm_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ibm_get_serialize( + _param = self._index_huawei_psirt_get_serialize( page=page, limit=limit, cursor=cursor, @@ -148155,7 +148155,7 @@ async def index_ibm_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIBMPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiPaginatePagination", '404': "str", '500': "str", } @@ -148166,7 +148166,7 @@ async def index_ibm_get_without_preload_content( return response_data.response - def _index_ibm_get_serialize( + def _index_huawei_psirt_get_serialize( self, page, limit, @@ -148334,7 +148334,7 @@ def _index_ibm_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ibm', + resource_path='/v3/index/huawei-psirt', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -148351,7 +148351,7 @@ def _index_ibm_get_serialize( @validate_call - async def index_idemia_get( + async def index_iava_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -148389,10 +148389,10 @@ async def index_idemia_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryIdemiaPaginatePagination: - """Return vulnerability data stored in index \"idemia\" + ) -> RenderResponseWithMetadataArrayAdvisoryIAVAPaginatePagination: + """Return vulnerability data stored in index \"iava\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the idemia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Idemia Product Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/idemia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/idemia?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the iava index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Information Assurance Vulnerability Alerts (IAVA) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/iava?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/iava?cursor=` :param page: set the page number of the response :type page: int @@ -148464,7 +148464,7 @@ async def index_idemia_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_idemia_get_serialize( + _param = self._index_iava_get_serialize( page=page, limit=limit, cursor=cursor, @@ -148496,7 +148496,7 @@ async def index_idemia_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIdemiaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIAVAPaginatePagination", '404': "str", '500': "str", } @@ -148512,7 +148512,7 @@ async def index_idemia_get( @validate_call - async def index_idemia_get_with_http_info( + async def index_iava_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -148550,10 +148550,10 @@ async def index_idemia_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIdemiaPaginatePagination]: - """Return vulnerability data stored in index \"idemia\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIAVAPaginatePagination]: + """Return vulnerability data stored in index \"iava\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the idemia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Idemia Product Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/idemia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/idemia?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the iava index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Information Assurance Vulnerability Alerts (IAVA) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/iava?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/iava?cursor=` :param page: set the page number of the response :type page: int @@ -148625,7 +148625,7 @@ async def index_idemia_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_idemia_get_serialize( + _param = self._index_iava_get_serialize( page=page, limit=limit, cursor=cursor, @@ -148657,7 +148657,7 @@ async def index_idemia_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIdemiaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIAVAPaginatePagination", '404': "str", '500': "str", } @@ -148673,7 +148673,7 @@ async def index_idemia_get_with_http_info( @validate_call - async def index_idemia_get_without_preload_content( + async def index_iava_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -148712,9 +148712,9 @@ async def index_idemia_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"idemia\" + """Return vulnerability data stored in index \"iava\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the idemia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Idemia Product Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/idemia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/idemia?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the iava index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Information Assurance Vulnerability Alerts (IAVA) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/iava?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/iava?cursor=` :param page: set the page number of the response :type page: int @@ -148786,7 +148786,7 @@ async def index_idemia_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_idemia_get_serialize( + _param = self._index_iava_get_serialize( page=page, limit=limit, cursor=cursor, @@ -148818,7 +148818,7 @@ async def index_idemia_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIdemiaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIAVAPaginatePagination", '404': "str", '500': "str", } @@ -148829,7 +148829,7 @@ async def index_idemia_get_without_preload_content( return response_data.response - def _index_idemia_get_serialize( + def _index_iava_get_serialize( self, page, limit, @@ -148997,7 +148997,7 @@ def _index_idemia_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/idemia', + resource_path='/v3/index/iava', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -149014,7 +149014,7 @@ def _index_idemia_get_serialize( @validate_call - async def index_igel_get( + async def index_ibm_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -149052,10 +149052,10 @@ async def index_igel_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryIgelPaginatePagination: - """Return vulnerability data stored in index \"igel\" + ) -> RenderResponseWithMetadataArrayAdvisoryIBMPaginatePagination: + """Return vulnerability data stored in index \"ibm\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the igel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** IGEL Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/igel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/igel?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ibm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** IBM Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ibm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ibm?cursor=` :param page: set the page number of the response :type page: int @@ -149127,7 +149127,7 @@ async def index_igel_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_igel_get_serialize( + _param = self._index_ibm_get_serialize( page=page, limit=limit, cursor=cursor, @@ -149159,7 +149159,7 @@ async def index_igel_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIgelPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIBMPaginatePagination", '404': "str", '500': "str", } @@ -149175,7 +149175,7 @@ async def index_igel_get( @validate_call - async def index_igel_get_with_http_info( + async def index_ibm_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -149213,10 +149213,10 @@ async def index_igel_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIgelPaginatePagination]: - """Return vulnerability data stored in index \"igel\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIBMPaginatePagination]: + """Return vulnerability data stored in index \"ibm\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the igel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** IGEL Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/igel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/igel?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ibm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** IBM Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ibm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ibm?cursor=` :param page: set the page number of the response :type page: int @@ -149288,7 +149288,7 @@ async def index_igel_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_igel_get_serialize( + _param = self._index_ibm_get_serialize( page=page, limit=limit, cursor=cursor, @@ -149320,7 +149320,7 @@ async def index_igel_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIgelPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIBMPaginatePagination", '404': "str", '500': "str", } @@ -149336,7 +149336,7 @@ async def index_igel_get_with_http_info( @validate_call - async def index_igel_get_without_preload_content( + async def index_ibm_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -149375,9 +149375,9 @@ async def index_igel_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"igel\" + """Return vulnerability data stored in index \"ibm\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the igel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** IGEL Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/igel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/igel?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ibm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** IBM Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ibm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ibm?cursor=` :param page: set the page number of the response :type page: int @@ -149449,7 +149449,7 @@ async def index_igel_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_igel_get_serialize( + _param = self._index_ibm_get_serialize( page=page, limit=limit, cursor=cursor, @@ -149481,7 +149481,7 @@ async def index_igel_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIgelPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIBMPaginatePagination", '404': "str", '500': "str", } @@ -149492,7 +149492,7 @@ async def index_igel_get_without_preload_content( return response_data.response - def _index_igel_get_serialize( + def _index_ibm_get_serialize( self, page, limit, @@ -149660,7 +149660,7 @@ def _index_igel_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/igel', + resource_path='/v3/index/ibm', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -149677,7 +149677,7 @@ def _index_igel_get_serialize( @validate_call - async def index_il_alerts_get( + async def index_idemia_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -149715,10 +149715,10 @@ async def index_il_alerts_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryIsraeliAlertPaginatePagination: - """Return vulnerability data stored in index \"il-alerts\" + ) -> RenderResponseWithMetadataArrayAdvisoryIdemiaPaginatePagination: + """Return vulnerability data stored in index \"idemia\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the il-alerts index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Gov.il Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/il-alerts?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/il-alerts?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the idemia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Idemia Product Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/idemia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/idemia?cursor=` :param page: set the page number of the response :type page: int @@ -149790,7 +149790,7 @@ async def index_il_alerts_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_il_alerts_get_serialize( + _param = self._index_idemia_get_serialize( page=page, limit=limit, cursor=cursor, @@ -149822,7 +149822,7 @@ async def index_il_alerts_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIsraeliAlertPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIdemiaPaginatePagination", '404': "str", '500': "str", } @@ -149838,7 +149838,7 @@ async def index_il_alerts_get( @validate_call - async def index_il_alerts_get_with_http_info( + async def index_idemia_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -149876,10 +149876,10 @@ async def index_il_alerts_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIsraeliAlertPaginatePagination]: - """Return vulnerability data stored in index \"il-alerts\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIdemiaPaginatePagination]: + """Return vulnerability data stored in index \"idemia\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the il-alerts index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Gov.il Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/il-alerts?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/il-alerts?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the idemia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Idemia Product Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/idemia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/idemia?cursor=` :param page: set the page number of the response :type page: int @@ -149951,7 +149951,7 @@ async def index_il_alerts_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_il_alerts_get_serialize( + _param = self._index_idemia_get_serialize( page=page, limit=limit, cursor=cursor, @@ -149983,7 +149983,7 @@ async def index_il_alerts_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIsraeliAlertPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIdemiaPaginatePagination", '404': "str", '500': "str", } @@ -149999,7 +149999,7 @@ async def index_il_alerts_get_with_http_info( @validate_call - async def index_il_alerts_get_without_preload_content( + async def index_idemia_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -150038,9 +150038,9 @@ async def index_il_alerts_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"il-alerts\" + """Return vulnerability data stored in index \"idemia\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the il-alerts index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Gov.il Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/il-alerts?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/il-alerts?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the idemia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Idemia Product Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/idemia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/idemia?cursor=` :param page: set the page number of the response :type page: int @@ -150112,7 +150112,7 @@ async def index_il_alerts_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_il_alerts_get_serialize( + _param = self._index_idemia_get_serialize( page=page, limit=limit, cursor=cursor, @@ -150144,7 +150144,7 @@ async def index_il_alerts_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIsraeliAlertPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIdemiaPaginatePagination", '404': "str", '500': "str", } @@ -150155,7 +150155,7 @@ async def index_il_alerts_get_without_preload_content( return response_data.response - def _index_il_alerts_get_serialize( + def _index_idemia_get_serialize( self, page, limit, @@ -150323,7 +150323,7 @@ def _index_il_alerts_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/il-alerts', + resource_path='/v3/index/idemia', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -150340,7 +150340,7 @@ def _index_il_alerts_get_serialize( @validate_call - async def index_il_vulnerabilities_get( + async def index_igel_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -150378,10 +150378,10 @@ async def index_il_vulnerabilities_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryIsraeliVulnerabilityPaginatePagination: - """Return vulnerability data stored in index \"il-vulnerabilities\" + ) -> RenderResponseWithMetadataArrayAdvisoryIgelPaginatePagination: + """Return vulnerability data stored in index \"igel\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the il-vulnerabilities index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Gov.il CVE Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/il-vulnerabilities?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/il-vulnerabilities?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the igel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** IGEL Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/igel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/igel?cursor=` :param page: set the page number of the response :type page: int @@ -150453,7 +150453,7 @@ async def index_il_vulnerabilities_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_il_vulnerabilities_get_serialize( + _param = self._index_igel_get_serialize( page=page, limit=limit, cursor=cursor, @@ -150485,7 +150485,7 @@ async def index_il_vulnerabilities_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIsraeliVulnerabilityPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIgelPaginatePagination", '404': "str", '500': "str", } @@ -150501,7 +150501,7 @@ async def index_il_vulnerabilities_get( @validate_call - async def index_il_vulnerabilities_get_with_http_info( + async def index_igel_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -150539,10 +150539,10 @@ async def index_il_vulnerabilities_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIsraeliVulnerabilityPaginatePagination]: - """Return vulnerability data stored in index \"il-vulnerabilities\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIgelPaginatePagination]: + """Return vulnerability data stored in index \"igel\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the il-vulnerabilities index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Gov.il CVE Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/il-vulnerabilities?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/il-vulnerabilities?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the igel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** IGEL Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/igel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/igel?cursor=` :param page: set the page number of the response :type page: int @@ -150614,7 +150614,7 @@ async def index_il_vulnerabilities_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_il_vulnerabilities_get_serialize( + _param = self._index_igel_get_serialize( page=page, limit=limit, cursor=cursor, @@ -150646,7 +150646,7 @@ async def index_il_vulnerabilities_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIsraeliVulnerabilityPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIgelPaginatePagination", '404': "str", '500': "str", } @@ -150662,7 +150662,7 @@ async def index_il_vulnerabilities_get_with_http_info( @validate_call - async def index_il_vulnerabilities_get_without_preload_content( + async def index_igel_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -150701,9 +150701,9 @@ async def index_il_vulnerabilities_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"il-vulnerabilities\" + """Return vulnerability data stored in index \"igel\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the il-vulnerabilities index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Gov.il CVE Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/il-vulnerabilities?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/il-vulnerabilities?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the igel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** IGEL Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/igel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/igel?cursor=` :param page: set the page number of the response :type page: int @@ -150775,7 +150775,7 @@ async def index_il_vulnerabilities_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_il_vulnerabilities_get_serialize( + _param = self._index_igel_get_serialize( page=page, limit=limit, cursor=cursor, @@ -150807,7 +150807,7 @@ async def index_il_vulnerabilities_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIsraeliVulnerabilityPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIgelPaginatePagination", '404': "str", '500': "str", } @@ -150818,7 +150818,7 @@ async def index_il_vulnerabilities_get_without_preload_content( return response_data.response - def _index_il_vulnerabilities_get_serialize( + def _index_igel_get_serialize( self, page, limit, @@ -150986,7 +150986,7 @@ def _index_il_vulnerabilities_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/il-vulnerabilities', + resource_path='/v3/index/igel', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -151003,7 +151003,7 @@ def _index_il_vulnerabilities_get_serialize( @validate_call - async def index_incibe_get( + async def index_il_alerts_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -151041,10 +151041,10 @@ async def index_incibe_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryIncibeAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"incibe\" + ) -> RenderResponseWithMetadataArrayAdvisoryIsraeliAlertPaginatePagination: + """Return vulnerability data stored in index \"il-alerts\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the incibe index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Incibe CERT Early Warnings ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/incibe?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/incibe?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the il-alerts index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Gov.il Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/il-alerts?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/il-alerts?cursor=` :param page: set the page number of the response :type page: int @@ -151116,7 +151116,7 @@ async def index_incibe_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_incibe_get_serialize( + _param = self._index_il_alerts_get_serialize( page=page, limit=limit, cursor=cursor, @@ -151148,7 +151148,7 @@ async def index_incibe_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIncibeAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIsraeliAlertPaginatePagination", '404': "str", '500': "str", } @@ -151164,7 +151164,7 @@ async def index_incibe_get( @validate_call - async def index_incibe_get_with_http_info( + async def index_il_alerts_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -151202,10 +151202,10 @@ async def index_incibe_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIncibeAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"incibe\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIsraeliAlertPaginatePagination]: + """Return vulnerability data stored in index \"il-alerts\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the incibe index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Incibe CERT Early Warnings ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/incibe?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/incibe?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the il-alerts index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Gov.il Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/il-alerts?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/il-alerts?cursor=` :param page: set the page number of the response :type page: int @@ -151277,7 +151277,7 @@ async def index_incibe_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_incibe_get_serialize( + _param = self._index_il_alerts_get_serialize( page=page, limit=limit, cursor=cursor, @@ -151309,7 +151309,7 @@ async def index_incibe_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIncibeAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIsraeliAlertPaginatePagination", '404': "str", '500': "str", } @@ -151325,7 +151325,7 @@ async def index_incibe_get_with_http_info( @validate_call - async def index_incibe_get_without_preload_content( + async def index_il_alerts_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -151364,9 +151364,9 @@ async def index_incibe_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"incibe\" + """Return vulnerability data stored in index \"il-alerts\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the incibe index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Incibe CERT Early Warnings ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/incibe?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/incibe?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the il-alerts index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Gov.il Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/il-alerts?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/il-alerts?cursor=` :param page: set the page number of the response :type page: int @@ -151438,7 +151438,7 @@ async def index_incibe_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_incibe_get_serialize( + _param = self._index_il_alerts_get_serialize( page=page, limit=limit, cursor=cursor, @@ -151470,7 +151470,7 @@ async def index_incibe_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIncibeAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIsraeliAlertPaginatePagination", '404': "str", '500': "str", } @@ -151481,7 +151481,7 @@ async def index_incibe_get_without_preload_content( return response_data.response - def _index_incibe_get_serialize( + def _index_il_alerts_get_serialize( self, page, limit, @@ -151649,7 +151649,7 @@ def _index_incibe_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/incibe', + resource_path='/v3/index/il-alerts', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -151666,7 +151666,7 @@ def _index_incibe_get_serialize( @validate_call - async def index_initial_access_get( + async def index_il_vulnerabilities_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -151704,10 +151704,10 @@ async def index_initial_access_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination: - """Return vulnerability data stored in index \"initial-access\" + ) -> RenderResponseWithMetadataArrayAdvisoryIsraeliVulnerabilityPaginatePagination: + """Return vulnerability data stored in index \"il-vulnerabilities\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the initial-access index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Initial Access Intelligence ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/initial-access?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the il-vulnerabilities index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Gov.il CVE Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/il-vulnerabilities?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/il-vulnerabilities?cursor=` :param page: set the page number of the response :type page: int @@ -151779,7 +151779,7 @@ async def index_initial_access_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_initial_access_get_serialize( + _param = self._index_il_vulnerabilities_get_serialize( page=page, limit=limit, cursor=cursor, @@ -151811,7 +151811,7 @@ async def index_initial_access_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIsraeliVulnerabilityPaginatePagination", '404': "str", '500': "str", } @@ -151827,7 +151827,7 @@ async def index_initial_access_get( @validate_call - async def index_initial_access_get_with_http_info( + async def index_il_vulnerabilities_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -151865,10 +151865,10 @@ async def index_initial_access_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination]: - """Return vulnerability data stored in index \"initial-access\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIsraeliVulnerabilityPaginatePagination]: + """Return vulnerability data stored in index \"il-vulnerabilities\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the initial-access index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Initial Access Intelligence ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/initial-access?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the il-vulnerabilities index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Gov.il CVE Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/il-vulnerabilities?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/il-vulnerabilities?cursor=` :param page: set the page number of the response :type page: int @@ -151940,7 +151940,7 @@ async def index_initial_access_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_initial_access_get_serialize( + _param = self._index_il_vulnerabilities_get_serialize( page=page, limit=limit, cursor=cursor, @@ -151972,7 +151972,7 @@ async def index_initial_access_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIsraeliVulnerabilityPaginatePagination", '404': "str", '500': "str", } @@ -151988,7 +151988,7 @@ async def index_initial_access_get_with_http_info( @validate_call - async def index_initial_access_get_without_preload_content( + async def index_il_vulnerabilities_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -152027,9 +152027,9 @@ async def index_initial_access_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"initial-access\" + """Return vulnerability data stored in index \"il-vulnerabilities\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the initial-access index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Initial Access Intelligence ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/initial-access?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the il-vulnerabilities index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Gov.il CVE Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/il-vulnerabilities?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/il-vulnerabilities?cursor=` :param page: set the page number of the response :type page: int @@ -152101,7 +152101,7 @@ async def index_initial_access_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_initial_access_get_serialize( + _param = self._index_il_vulnerabilities_get_serialize( page=page, limit=limit, cursor=cursor, @@ -152133,7 +152133,7 @@ async def index_initial_access_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIsraeliVulnerabilityPaginatePagination", '404': "str", '500': "str", } @@ -152144,7 +152144,7 @@ async def index_initial_access_get_without_preload_content( return response_data.response - def _index_initial_access_get_serialize( + def _index_il_vulnerabilities_get_serialize( self, page, limit, @@ -152312,7 +152312,7 @@ def _index_initial_access_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/initial-access', + resource_path='/v3/index/il-vulnerabilities', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -152329,7 +152329,7 @@ def _index_initial_access_get_serialize( @validate_call - async def index_initial_access_git_get( + async def index_incibe_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -152367,10 +152367,10 @@ async def index_initial_access_git_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination: - """Return vulnerability data stored in index \"initial-access-git\" + ) -> RenderResponseWithMetadataArrayAdvisoryIncibeAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"incibe\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the initial-access-git index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Initial Access Intelligence Git Backup for Subscribers ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access-git?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/initial-access-git?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the incibe index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Incibe CERT Early Warnings ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/incibe?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/incibe?cursor=` :param page: set the page number of the response :type page: int @@ -152442,7 +152442,7 @@ async def index_initial_access_git_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_initial_access_git_get_serialize( + _param = self._index_incibe_get_serialize( page=page, limit=limit, cursor=cursor, @@ -152474,7 +152474,7 @@ async def index_initial_access_git_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIncibeAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -152490,7 +152490,7 @@ async def index_initial_access_git_get( @validate_call - async def index_initial_access_git_get_with_http_info( + async def index_incibe_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -152528,10 +152528,10 @@ async def index_initial_access_git_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination]: - """Return vulnerability data stored in index \"initial-access-git\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIncibeAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"incibe\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the initial-access-git index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Initial Access Intelligence Git Backup for Subscribers ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access-git?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/initial-access-git?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the incibe index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Incibe CERT Early Warnings ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/incibe?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/incibe?cursor=` :param page: set the page number of the response :type page: int @@ -152603,7 +152603,7 @@ async def index_initial_access_git_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_initial_access_git_get_serialize( + _param = self._index_incibe_get_serialize( page=page, limit=limit, cursor=cursor, @@ -152635,7 +152635,7 @@ async def index_initial_access_git_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIncibeAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -152651,7 +152651,7 @@ async def index_initial_access_git_get_with_http_info( @validate_call - async def index_initial_access_git_get_without_preload_content( + async def index_incibe_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -152690,9 +152690,9 @@ async def index_initial_access_git_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"initial-access-git\" + """Return vulnerability data stored in index \"incibe\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the initial-access-git index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Initial Access Intelligence Git Backup for Subscribers ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access-git?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/initial-access-git?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the incibe index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Incibe CERT Early Warnings ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/incibe?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/incibe?cursor=` :param page: set the page number of the response :type page: int @@ -152764,7 +152764,7 @@ async def index_initial_access_git_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_initial_access_git_get_serialize( + _param = self._index_incibe_get_serialize( page=page, limit=limit, cursor=cursor, @@ -152796,7 +152796,7 @@ async def index_initial_access_git_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIncibeAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -152807,7 +152807,7 @@ async def index_initial_access_git_get_without_preload_content( return response_data.response - def _index_initial_access_git_get_serialize( + def _index_incibe_get_serialize( self, page, limit, @@ -152975,7 +152975,7 @@ def _index_initial_access_git_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/initial-access-git', + resource_path='/v3/index/incibe', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -152992,7 +152992,7 @@ def _index_initial_access_git_get_serialize( @validate_call - async def index_intel_get( + async def index_initial_access_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -153030,10 +153030,10 @@ async def index_intel_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryIntelPaginatePagination: - """Return vulnerability data stored in index \"intel\" + ) -> RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination: + """Return vulnerability data stored in index \"initial-access\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the intel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Intel® Product Security Center Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/intel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/intel?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the initial-access index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Initial Access Intelligence ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/initial-access?cursor=` :param page: set the page number of the response :type page: int @@ -153105,7 +153105,7 @@ async def index_intel_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_intel_get_serialize( + _param = self._index_initial_access_get_serialize( page=page, limit=limit, cursor=cursor, @@ -153137,7 +153137,7 @@ async def index_intel_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIntelPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination", '404': "str", '500': "str", } @@ -153153,7 +153153,7 @@ async def index_intel_get( @validate_call - async def index_intel_get_with_http_info( + async def index_initial_access_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -153191,10 +153191,10 @@ async def index_intel_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIntelPaginatePagination]: - """Return vulnerability data stored in index \"intel\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination]: + """Return vulnerability data stored in index \"initial-access\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the intel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Intel® Product Security Center Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/intel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/intel?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the initial-access index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Initial Access Intelligence ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/initial-access?cursor=` :param page: set the page number of the response :type page: int @@ -153266,7 +153266,7 @@ async def index_intel_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_intel_get_serialize( + _param = self._index_initial_access_get_serialize( page=page, limit=limit, cursor=cursor, @@ -153298,7 +153298,7 @@ async def index_intel_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIntelPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination", '404': "str", '500': "str", } @@ -153314,7 +153314,7 @@ async def index_intel_get_with_http_info( @validate_call - async def index_intel_get_without_preload_content( + async def index_initial_access_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -153353,9 +153353,9 @@ async def index_intel_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"intel\" + """Return vulnerability data stored in index \"initial-access\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the intel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Intel® Product Security Center Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/intel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/intel?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the initial-access index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Initial Access Intelligence ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/initial-access?cursor=` :param page: set the page number of the response :type page: int @@ -153427,7 +153427,7 @@ async def index_intel_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_intel_get_serialize( + _param = self._index_initial_access_get_serialize( page=page, limit=limit, cursor=cursor, @@ -153459,7 +153459,7 @@ async def index_intel_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIntelPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination", '404': "str", '500': "str", } @@ -153470,7 +153470,7 @@ async def index_intel_get_without_preload_content( return response_data.response - def _index_intel_get_serialize( + def _index_initial_access_get_serialize( self, page, limit, @@ -153638,7 +153638,7 @@ def _index_intel_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/intel', + resource_path='/v3/index/initial-access', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -153655,7 +153655,7 @@ def _index_intel_get_serialize( @validate_call - async def index_ipintel10d_get( + async def index_initial_access_git_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -153666,19 +153666,14 @@ async def index_ipintel10d_get( cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, + jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, + ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, - cidr: Annotated[Optional[StrictStr], Field(description="Specify an IPv4 or IPv6 CIDR")] = None, - asn: Annotated[Optional[StrictStr], Field(description="Autonomous system number")] = None, - country: Annotated[Optional[StrictStr], Field(description="Country name ISO-3166?? format")] = None, - country_code: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166?? format")] = None, - id: Annotated[Optional[StrictStr], Field(description="Record type")] = None, - kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, - hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, - matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, + published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -153698,10 +153693,10 @@ async def index_ipintel10d_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination: - """Return vulnerability data stored in index \"ipintel-10d\" + ) -> RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination: + """Return vulnerability data stored in index \"initial-access-git\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-10d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 10-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-10d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-10d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the initial-access-git index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Initial Access Intelligence Git Backup for Subscribers ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access-git?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/initial-access-git?cursor=` :param page: set the page number of the response :type page: int @@ -153721,6 +153716,10 @@ async def index_ipintel10d_get( :type alias: str :param iava: Specify an IAVA ID to search with. :type iava: str + :param jvndb: Specify a JVNDB ID to search with. + :type jvndb: str + :param ilvn: Specify an ILVN ID to search with. + :type ilvn: str :param threat_actor: Specify a threat actor name to search with. :type threat_actor: str :param mitre_id: Specify a MITRE ID to search with. @@ -153731,22 +153730,8 @@ async def index_ipintel10d_get( :type ransomware: str :param botnet: Specify a botnet name to search with. :type botnet: str - :param cidr: Specify an IPv4 or IPv6 CIDR - :type cidr: str - :param asn: Autonomous system number - :type asn: str - :param country: Country name ISO-3166?? format - :type country: str - :param country_code: Country code in ISO-3166?? format - :type country_code: str - :param id: Record type - :type id: str - :param kind: Kind of IpIntel Finding - :type kind: str - :param hostname: Match a string in the list of hostnames - :type hostname: str - :param matches: Search for a string in the field describing the finding - :type matches: str + :param published: Specify a published date + :type published: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -153783,7 +153768,7 @@ async def index_ipintel10d_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ipintel10d_get_serialize( + _param = self._index_initial_access_git_get_serialize( page=page, limit=limit, cursor=cursor, @@ -153793,19 +153778,14 @@ async def index_ipintel10d_get( cve=cve, alias=alias, iava=iava, + jvndb=jvndb, + ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, - cidr=cidr, - asn=asn, - country=country, - country_code=country_code, - id=id, - kind=kind, - hostname=hostname, - matches=matches, + published=published, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -153820,7 +153800,7 @@ async def index_ipintel10d_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination", '404': "str", '500': "str", } @@ -153836,7 +153816,7 @@ async def index_ipintel10d_get( @validate_call - async def index_ipintel10d_get_with_http_info( + async def index_initial_access_git_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -153847,19 +153827,14 @@ async def index_ipintel10d_get_with_http_info( cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, + jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, + ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, - cidr: Annotated[Optional[StrictStr], Field(description="Specify an IPv4 or IPv6 CIDR")] = None, - asn: Annotated[Optional[StrictStr], Field(description="Autonomous system number")] = None, - country: Annotated[Optional[StrictStr], Field(description="Country name ISO-3166?? format")] = None, - country_code: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166?? format")] = None, - id: Annotated[Optional[StrictStr], Field(description="Record type")] = None, - kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, - hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, - matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, + published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -153879,10 +153854,10 @@ async def index_ipintel10d_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination]: - """Return vulnerability data stored in index \"ipintel-10d\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination]: + """Return vulnerability data stored in index \"initial-access-git\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-10d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 10-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-10d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-10d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the initial-access-git index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Initial Access Intelligence Git Backup for Subscribers ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access-git?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/initial-access-git?cursor=` :param page: set the page number of the response :type page: int @@ -153902,6 +153877,10 @@ async def index_ipintel10d_get_with_http_info( :type alias: str :param iava: Specify an IAVA ID to search with. :type iava: str + :param jvndb: Specify a JVNDB ID to search with. + :type jvndb: str + :param ilvn: Specify an ILVN ID to search with. + :type ilvn: str :param threat_actor: Specify a threat actor name to search with. :type threat_actor: str :param mitre_id: Specify a MITRE ID to search with. @@ -153912,22 +153891,8 @@ async def index_ipintel10d_get_with_http_info( :type ransomware: str :param botnet: Specify a botnet name to search with. :type botnet: str - :param cidr: Specify an IPv4 or IPv6 CIDR - :type cidr: str - :param asn: Autonomous system number - :type asn: str - :param country: Country name ISO-3166?? format - :type country: str - :param country_code: Country code in ISO-3166?? format - :type country_code: str - :param id: Record type - :type id: str - :param kind: Kind of IpIntel Finding - :type kind: str - :param hostname: Match a string in the list of hostnames - :type hostname: str - :param matches: Search for a string in the field describing the finding - :type matches: str + :param published: Specify a published date + :type published: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -153964,7 +153929,7 @@ async def index_ipintel10d_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ipintel10d_get_serialize( + _param = self._index_initial_access_git_get_serialize( page=page, limit=limit, cursor=cursor, @@ -153974,19 +153939,14 @@ async def index_ipintel10d_get_with_http_info( cve=cve, alias=alias, iava=iava, + jvndb=jvndb, + ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, - cidr=cidr, - asn=asn, - country=country, - country_code=country_code, - id=id, - kind=kind, - hostname=hostname, - matches=matches, + published=published, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -154001,7 +153961,7 @@ async def index_ipintel10d_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination", '404': "str", '500': "str", } @@ -154017,7 +153977,7 @@ async def index_ipintel10d_get_with_http_info( @validate_call - async def index_ipintel10d_get_without_preload_content( + async def index_initial_access_git_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -154028,19 +153988,14 @@ async def index_ipintel10d_get_without_preload_content( cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, + jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, + ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, - cidr: Annotated[Optional[StrictStr], Field(description="Specify an IPv4 or IPv6 CIDR")] = None, - asn: Annotated[Optional[StrictStr], Field(description="Autonomous system number")] = None, - country: Annotated[Optional[StrictStr], Field(description="Country name ISO-3166?? format")] = None, - country_code: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166?? format")] = None, - id: Annotated[Optional[StrictStr], Field(description="Record type")] = None, - kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, - hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, - matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, + published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -154061,9 +154016,9 @@ async def index_ipintel10d_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ipintel-10d\" + """Return vulnerability data stored in index \"initial-access-git\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-10d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 10-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-10d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-10d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the initial-access-git index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Initial Access Intelligence Git Backup for Subscribers ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access-git?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/initial-access-git?cursor=` :param page: set the page number of the response :type page: int @@ -154083,6 +154038,10 @@ async def index_ipintel10d_get_without_preload_content( :type alias: str :param iava: Specify an IAVA ID to search with. :type iava: str + :param jvndb: Specify a JVNDB ID to search with. + :type jvndb: str + :param ilvn: Specify an ILVN ID to search with. + :type ilvn: str :param threat_actor: Specify a threat actor name to search with. :type threat_actor: str :param mitre_id: Specify a MITRE ID to search with. @@ -154093,22 +154052,8 @@ async def index_ipintel10d_get_without_preload_content( :type ransomware: str :param botnet: Specify a botnet name to search with. :type botnet: str - :param cidr: Specify an IPv4 or IPv6 CIDR - :type cidr: str - :param asn: Autonomous system number - :type asn: str - :param country: Country name ISO-3166?? format - :type country: str - :param country_code: Country code in ISO-3166?? format - :type country_code: str - :param id: Record type - :type id: str - :param kind: Kind of IpIntel Finding - :type kind: str - :param hostname: Match a string in the list of hostnames - :type hostname: str - :param matches: Search for a string in the field describing the finding - :type matches: str + :param published: Specify a published date + :type published: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -154145,7 +154090,7 @@ async def index_ipintel10d_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ipintel10d_get_serialize( + _param = self._index_initial_access_git_get_serialize( page=page, limit=limit, cursor=cursor, @@ -154155,19 +154100,14 @@ async def index_ipintel10d_get_without_preload_content( cve=cve, alias=alias, iava=iava, + jvndb=jvndb, + ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, - cidr=cidr, - asn=asn, - country=country, - country_code=country_code, - id=id, - kind=kind, - hostname=hostname, - matches=matches, + published=published, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -154182,7 +154122,7 @@ async def index_ipintel10d_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination", '404': "str", '500': "str", } @@ -154193,7 +154133,7 @@ async def index_ipintel10d_get_without_preload_content( return response_data.response - def _index_ipintel10d_get_serialize( + def _index_initial_access_git_get_serialize( self, page, limit, @@ -154204,19 +154144,14 @@ def _index_ipintel10d_get_serialize( cve, alias, iava, + jvndb, + ilvn, threat_actor, mitre_id, misp_id, ransomware, botnet, - cidr, - asn, - country, - country_code, - id, - kind, - hostname, - matches, + published, date, updated_at_start_date, updated_at_end_date, @@ -154285,6 +154220,14 @@ def _index_ipintel10d_get_serialize( _query_params.append(('iava', iava)) + if jvndb is not None: + + _query_params.append(('jvndb', jvndb)) + + if ilvn is not None: + + _query_params.append(('ilvn', ilvn)) + if threat_actor is not None: _query_params.append(('threat_actor', threat_actor)) @@ -154305,37 +154248,9 @@ def _index_ipintel10d_get_serialize( _query_params.append(('botnet', botnet)) - if cidr is not None: - - _query_params.append(('cidr', cidr)) - - if asn is not None: - - _query_params.append(('asn', asn)) - - if country is not None: - - _query_params.append(('country', country)) - - if country_code is not None: - - _query_params.append(('country_code', country_code)) - - if id is not None: - - _query_params.append(('id', id)) - - if kind is not None: - - _query_params.append(('kind', kind)) - - if hostname is not None: - - _query_params.append(('hostname', hostname)) - - if matches is not None: + if published is not None: - _query_params.append(('matches', matches)) + _query_params.append(('published', published)) if date is not None: @@ -154386,7 +154301,7 @@ def _index_ipintel10d_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ipintel-10d', + resource_path='/v3/index/initial-access-git', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -154403,7 +154318,7 @@ def _index_ipintel10d_get_serialize( @validate_call - async def index_ipintel30d_get( + async def index_intel_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -154414,19 +154329,14 @@ async def index_ipintel30d_get( cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, + jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, + ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, - cidr: Annotated[Optional[StrictStr], Field(description="Specify an IPv4 or IPv6 CIDR")] = None, - asn: Annotated[Optional[StrictStr], Field(description="Autonomous system number")] = None, - country: Annotated[Optional[StrictStr], Field(description="Country name ISO-3166?? format")] = None, - country_code: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166?? format")] = None, - id: Annotated[Optional[StrictStr], Field(description="Record type")] = None, - kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, - hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, - matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, + published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -154446,10 +154356,10 @@ async def index_ipintel30d_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination: - """Return vulnerability data stored in index \"ipintel-30d\" + ) -> RenderResponseWithMetadataArrayAdvisoryIntelPaginatePagination: + """Return vulnerability data stored in index \"intel\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-30d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 30-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-30d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-30d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the intel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Intel® Product Security Center Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/intel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/intel?cursor=` :param page: set the page number of the response :type page: int @@ -154469,6 +154379,10 @@ async def index_ipintel30d_get( :type alias: str :param iava: Specify an IAVA ID to search with. :type iava: str + :param jvndb: Specify a JVNDB ID to search with. + :type jvndb: str + :param ilvn: Specify an ILVN ID to search with. + :type ilvn: str :param threat_actor: Specify a threat actor name to search with. :type threat_actor: str :param mitre_id: Specify a MITRE ID to search with. @@ -154479,22 +154393,8 @@ async def index_ipintel30d_get( :type ransomware: str :param botnet: Specify a botnet name to search with. :type botnet: str - :param cidr: Specify an IPv4 or IPv6 CIDR - :type cidr: str - :param asn: Autonomous system number - :type asn: str - :param country: Country name ISO-3166?? format - :type country: str - :param country_code: Country code in ISO-3166?? format - :type country_code: str - :param id: Record type - :type id: str - :param kind: Kind of IpIntel Finding - :type kind: str - :param hostname: Match a string in the list of hostnames - :type hostname: str - :param matches: Search for a string in the field describing the finding - :type matches: str + :param published: Specify a published date + :type published: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -154531,7 +154431,7 @@ async def index_ipintel30d_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ipintel30d_get_serialize( + _param = self._index_intel_get_serialize( page=page, limit=limit, cursor=cursor, @@ -154541,19 +154441,14 @@ async def index_ipintel30d_get( cve=cve, alias=alias, iava=iava, + jvndb=jvndb, + ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, - cidr=cidr, - asn=asn, - country=country, - country_code=country_code, - id=id, - kind=kind, - hostname=hostname, - matches=matches, + published=published, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -154568,7 +154463,7 @@ async def index_ipintel30d_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIntelPaginatePagination", '404': "str", '500': "str", } @@ -154584,7 +154479,7 @@ async def index_ipintel30d_get( @validate_call - async def index_ipintel30d_get_with_http_info( + async def index_intel_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -154595,19 +154490,14 @@ async def index_ipintel30d_get_with_http_info( cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, + jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, + ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, - cidr: Annotated[Optional[StrictStr], Field(description="Specify an IPv4 or IPv6 CIDR")] = None, - asn: Annotated[Optional[StrictStr], Field(description="Autonomous system number")] = None, - country: Annotated[Optional[StrictStr], Field(description="Country name ISO-3166?? format")] = None, - country_code: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166?? format")] = None, - id: Annotated[Optional[StrictStr], Field(description="Record type")] = None, - kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, - hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, - matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, + published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -154627,10 +154517,10 @@ async def index_ipintel30d_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination]: - """Return vulnerability data stored in index \"ipintel-30d\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIntelPaginatePagination]: + """Return vulnerability data stored in index \"intel\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-30d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 30-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-30d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-30d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the intel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Intel® Product Security Center Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/intel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/intel?cursor=` :param page: set the page number of the response :type page: int @@ -154650,6 +154540,10 @@ async def index_ipintel30d_get_with_http_info( :type alias: str :param iava: Specify an IAVA ID to search with. :type iava: str + :param jvndb: Specify a JVNDB ID to search with. + :type jvndb: str + :param ilvn: Specify an ILVN ID to search with. + :type ilvn: str :param threat_actor: Specify a threat actor name to search with. :type threat_actor: str :param mitre_id: Specify a MITRE ID to search with. @@ -154660,22 +154554,8 @@ async def index_ipintel30d_get_with_http_info( :type ransomware: str :param botnet: Specify a botnet name to search with. :type botnet: str - :param cidr: Specify an IPv4 or IPv6 CIDR - :type cidr: str - :param asn: Autonomous system number - :type asn: str - :param country: Country name ISO-3166?? format - :type country: str - :param country_code: Country code in ISO-3166?? format - :type country_code: str - :param id: Record type - :type id: str - :param kind: Kind of IpIntel Finding - :type kind: str - :param hostname: Match a string in the list of hostnames - :type hostname: str - :param matches: Search for a string in the field describing the finding - :type matches: str + :param published: Specify a published date + :type published: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -154712,7 +154592,7 @@ async def index_ipintel30d_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ipintel30d_get_serialize( + _param = self._index_intel_get_serialize( page=page, limit=limit, cursor=cursor, @@ -154722,19 +154602,14 @@ async def index_ipintel30d_get_with_http_info( cve=cve, alias=alias, iava=iava, + jvndb=jvndb, + ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, - cidr=cidr, - asn=asn, - country=country, - country_code=country_code, - id=id, - kind=kind, - hostname=hostname, - matches=matches, + published=published, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -154749,7 +154624,7 @@ async def index_ipintel30d_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIntelPaginatePagination", '404': "str", '500': "str", } @@ -154765,7 +154640,7 @@ async def index_ipintel30d_get_with_http_info( @validate_call - async def index_ipintel30d_get_without_preload_content( + async def index_intel_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -154776,19 +154651,14 @@ async def index_ipintel30d_get_without_preload_content( cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, + jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, + ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, - cidr: Annotated[Optional[StrictStr], Field(description="Specify an IPv4 or IPv6 CIDR")] = None, - asn: Annotated[Optional[StrictStr], Field(description="Autonomous system number")] = None, - country: Annotated[Optional[StrictStr], Field(description="Country name ISO-3166?? format")] = None, - country_code: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166?? format")] = None, - id: Annotated[Optional[StrictStr], Field(description="Record type")] = None, - kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, - hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, - matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, + published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -154809,9 +154679,9 @@ async def index_ipintel30d_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ipintel-30d\" + """Return vulnerability data stored in index \"intel\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-30d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 30-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-30d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-30d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the intel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Intel® Product Security Center Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/intel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/intel?cursor=` :param page: set the page number of the response :type page: int @@ -154831,6 +154701,10 @@ async def index_ipintel30d_get_without_preload_content( :type alias: str :param iava: Specify an IAVA ID to search with. :type iava: str + :param jvndb: Specify a JVNDB ID to search with. + :type jvndb: str + :param ilvn: Specify an ILVN ID to search with. + :type ilvn: str :param threat_actor: Specify a threat actor name to search with. :type threat_actor: str :param mitre_id: Specify a MITRE ID to search with. @@ -154841,22 +154715,8 @@ async def index_ipintel30d_get_without_preload_content( :type ransomware: str :param botnet: Specify a botnet name to search with. :type botnet: str - :param cidr: Specify an IPv4 or IPv6 CIDR - :type cidr: str - :param asn: Autonomous system number - :type asn: str - :param country: Country name ISO-3166?? format - :type country: str - :param country_code: Country code in ISO-3166?? format - :type country_code: str - :param id: Record type - :type id: str - :param kind: Kind of IpIntel Finding - :type kind: str - :param hostname: Match a string in the list of hostnames - :type hostname: str - :param matches: Search for a string in the field describing the finding - :type matches: str + :param published: Specify a published date + :type published: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -154893,7 +154753,7 @@ async def index_ipintel30d_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ipintel30d_get_serialize( + _param = self._index_intel_get_serialize( page=page, limit=limit, cursor=cursor, @@ -154903,19 +154763,14 @@ async def index_ipintel30d_get_without_preload_content( cve=cve, alias=alias, iava=iava, + jvndb=jvndb, + ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, - cidr=cidr, - asn=asn, - country=country, - country_code=country_code, - id=id, - kind=kind, - hostname=hostname, - matches=matches, + published=published, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -154930,7 +154785,7 @@ async def index_ipintel30d_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIntelPaginatePagination", '404': "str", '500': "str", } @@ -154941,7 +154796,7 @@ async def index_ipintel30d_get_without_preload_content( return response_data.response - def _index_ipintel30d_get_serialize( + def _index_intel_get_serialize( self, page, limit, @@ -154952,19 +154807,14 @@ def _index_ipintel30d_get_serialize( cve, alias, iava, + jvndb, + ilvn, threat_actor, mitre_id, misp_id, ransomware, botnet, - cidr, - asn, - country, - country_code, - id, - kind, - hostname, - matches, + published, date, updated_at_start_date, updated_at_end_date, @@ -155033,6 +154883,14 @@ def _index_ipintel30d_get_serialize( _query_params.append(('iava', iava)) + if jvndb is not None: + + _query_params.append(('jvndb', jvndb)) + + if ilvn is not None: + + _query_params.append(('ilvn', ilvn)) + if threat_actor is not None: _query_params.append(('threat_actor', threat_actor)) @@ -155053,37 +154911,9 @@ def _index_ipintel30d_get_serialize( _query_params.append(('botnet', botnet)) - if cidr is not None: - - _query_params.append(('cidr', cidr)) - - if asn is not None: - - _query_params.append(('asn', asn)) - - if country is not None: - - _query_params.append(('country', country)) - - if country_code is not None: - - _query_params.append(('country_code', country_code)) - - if id is not None: - - _query_params.append(('id', id)) - - if kind is not None: - - _query_params.append(('kind', kind)) - - if hostname is not None: - - _query_params.append(('hostname', hostname)) - - if matches is not None: + if published is not None: - _query_params.append(('matches', matches)) + _query_params.append(('published', published)) if date is not None: @@ -155134,7 +154964,7 @@ def _index_ipintel30d_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ipintel-30d', + resource_path='/v3/index/intel', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -155151,7 +154981,7 @@ def _index_ipintel30d_get_serialize( @validate_call - async def index_ipintel3d_get( + async def index_ipintel10d_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -155195,9 +155025,9 @@ async def index_ipintel3d_get( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination: - """Return vulnerability data stored in index \"ipintel-3d\" + """Return vulnerability data stored in index \"ipintel-10d\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-3d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 3-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-3d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-3d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-10d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 10-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-10d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-10d?cursor=` :param page: set the page number of the response :type page: int @@ -155279,7 +155109,7 @@ async def index_ipintel3d_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ipintel3d_get_serialize( + _param = self._index_ipintel10d_get_serialize( page=page, limit=limit, cursor=cursor, @@ -155332,7 +155162,7 @@ async def index_ipintel3d_get( @validate_call - async def index_ipintel3d_get_with_http_info( + async def index_ipintel10d_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -155376,9 +155206,9 @@ async def index_ipintel3d_get_with_http_info( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination]: - """Return vulnerability data stored in index \"ipintel-3d\" + """Return vulnerability data stored in index \"ipintel-10d\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-3d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 3-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-3d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-3d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-10d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 10-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-10d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-10d?cursor=` :param page: set the page number of the response :type page: int @@ -155460,7 +155290,7 @@ async def index_ipintel3d_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ipintel3d_get_serialize( + _param = self._index_ipintel10d_get_serialize( page=page, limit=limit, cursor=cursor, @@ -155513,7 +155343,7 @@ async def index_ipintel3d_get_with_http_info( @validate_call - async def index_ipintel3d_get_without_preload_content( + async def index_ipintel10d_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -155557,9 +155387,9 @@ async def index_ipintel3d_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ipintel-3d\" + """Return vulnerability data stored in index \"ipintel-10d\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-3d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 3-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-3d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-3d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-10d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 10-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-10d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-10d?cursor=` :param page: set the page number of the response :type page: int @@ -155641,7 +155471,7 @@ async def index_ipintel3d_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ipintel3d_get_serialize( + _param = self._index_ipintel10d_get_serialize( page=page, limit=limit, cursor=cursor, @@ -155689,7 +155519,7 @@ async def index_ipintel3d_get_without_preload_content( return response_data.response - def _index_ipintel3d_get_serialize( + def _index_ipintel10d_get_serialize( self, page, limit, @@ -155882,7 +155712,7 @@ def _index_ipintel3d_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ipintel-3d', + resource_path='/v3/index/ipintel-10d', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -155899,7 +155729,7 @@ def _index_ipintel3d_get_serialize( @validate_call - async def index_ipintel90d_get( + async def index_ipintel30d_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -155943,9 +155773,9 @@ async def index_ipintel90d_get( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination: - """Return vulnerability data stored in index \"ipintel-90d\" + """Return vulnerability data stored in index \"ipintel-30d\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-90d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 90-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-90d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-90d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-30d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 30-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-30d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-30d?cursor=` :param page: set the page number of the response :type page: int @@ -156027,7 +155857,7 @@ async def index_ipintel90d_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ipintel90d_get_serialize( + _param = self._index_ipintel30d_get_serialize( page=page, limit=limit, cursor=cursor, @@ -156080,7 +155910,7 @@ async def index_ipintel90d_get( @validate_call - async def index_ipintel90d_get_with_http_info( + async def index_ipintel30d_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -156124,9 +155954,9 @@ async def index_ipintel90d_get_with_http_info( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination]: - """Return vulnerability data stored in index \"ipintel-90d\" + """Return vulnerability data stored in index \"ipintel-30d\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-90d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 90-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-90d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-90d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-30d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 30-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-30d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-30d?cursor=` :param page: set the page number of the response :type page: int @@ -156208,7 +156038,7 @@ async def index_ipintel90d_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ipintel90d_get_serialize( + _param = self._index_ipintel30d_get_serialize( page=page, limit=limit, cursor=cursor, @@ -156261,7 +156091,7 @@ async def index_ipintel90d_get_with_http_info( @validate_call - async def index_ipintel90d_get_without_preload_content( + async def index_ipintel30d_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -156305,9 +156135,9 @@ async def index_ipintel90d_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ipintel-90d\" + """Return vulnerability data stored in index \"ipintel-30d\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-90d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 90-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-90d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-90d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-30d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 30-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-30d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-30d?cursor=` :param page: set the page number of the response :type page: int @@ -156389,7 +156219,7 @@ async def index_ipintel90d_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ipintel90d_get_serialize( + _param = self._index_ipintel30d_get_serialize( page=page, limit=limit, cursor=cursor, @@ -156437,7 +156267,7 @@ async def index_ipintel90d_get_without_preload_content( return response_data.response - def _index_ipintel90d_get_serialize( + def _index_ipintel30d_get_serialize( self, page, limit, @@ -156630,7 +156460,7 @@ def _index_ipintel90d_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ipintel-90d', + resource_path='/v3/index/ipintel-30d', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -156647,7 +156477,7 @@ def _index_ipintel90d_get_serialize( @validate_call - async def index_istio_get( + async def index_ipintel3d_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -156658,14 +156488,19 @@ async def index_istio_get( cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, - jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, - ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, - published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, + cidr: Annotated[Optional[StrictStr], Field(description="Specify an IPv4 or IPv6 CIDR")] = None, + asn: Annotated[Optional[StrictStr], Field(description="Autonomous system number")] = None, + country: Annotated[Optional[StrictStr], Field(description="Country name ISO-3166?? format")] = None, + country_code: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166?? format")] = None, + id: Annotated[Optional[StrictStr], Field(description="Record type")] = None, + kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, + hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, + matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -156685,10 +156520,10 @@ async def index_istio_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryIstioPaginatePagination: - """Return vulnerability data stored in index \"istio\" + ) -> RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination: + """Return vulnerability data stored in index \"ipintel-3d\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the istio index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Istio Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/istio?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/istio?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-3d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 3-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-3d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-3d?cursor=` :param page: set the page number of the response :type page: int @@ -156708,10 +156543,6 @@ async def index_istio_get( :type alias: str :param iava: Specify an IAVA ID to search with. :type iava: str - :param jvndb: Specify a JVNDB ID to search with. - :type jvndb: str - :param ilvn: Specify an ILVN ID to search with. - :type ilvn: str :param threat_actor: Specify a threat actor name to search with. :type threat_actor: str :param mitre_id: Specify a MITRE ID to search with. @@ -156722,8 +156553,22 @@ async def index_istio_get( :type ransomware: str :param botnet: Specify a botnet name to search with. :type botnet: str - :param published: Specify a published date - :type published: str + :param cidr: Specify an IPv4 or IPv6 CIDR + :type cidr: str + :param asn: Autonomous system number + :type asn: str + :param country: Country name ISO-3166?? format + :type country: str + :param country_code: Country code in ISO-3166?? format + :type country_code: str + :param id: Record type + :type id: str + :param kind: Kind of IpIntel Finding + :type kind: str + :param hostname: Match a string in the list of hostnames + :type hostname: str + :param matches: Search for a string in the field describing the finding + :type matches: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -156760,7 +156605,7 @@ async def index_istio_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_istio_get_serialize( + _param = self._index_ipintel3d_get_serialize( page=page, limit=limit, cursor=cursor, @@ -156770,14 +156615,19 @@ async def index_istio_get( cve=cve, alias=alias, iava=iava, - jvndb=jvndb, - ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, - published=published, + cidr=cidr, + asn=asn, + country=country, + country_code=country_code, + id=id, + kind=kind, + hostname=hostname, + matches=matches, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -156792,7 +156642,7 @@ async def index_istio_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIstioPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination", '404': "str", '500': "str", } @@ -156808,7 +156658,7 @@ async def index_istio_get( @validate_call - async def index_istio_get_with_http_info( + async def index_ipintel3d_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -156819,14 +156669,19 @@ async def index_istio_get_with_http_info( cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, - jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, - ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, - published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, + cidr: Annotated[Optional[StrictStr], Field(description="Specify an IPv4 or IPv6 CIDR")] = None, + asn: Annotated[Optional[StrictStr], Field(description="Autonomous system number")] = None, + country: Annotated[Optional[StrictStr], Field(description="Country name ISO-3166?? format")] = None, + country_code: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166?? format")] = None, + id: Annotated[Optional[StrictStr], Field(description="Record type")] = None, + kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, + hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, + matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -156846,10 +156701,10 @@ async def index_istio_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIstioPaginatePagination]: - """Return vulnerability data stored in index \"istio\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination]: + """Return vulnerability data stored in index \"ipintel-3d\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the istio index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Istio Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/istio?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/istio?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-3d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 3-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-3d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-3d?cursor=` :param page: set the page number of the response :type page: int @@ -156869,10 +156724,6 @@ async def index_istio_get_with_http_info( :type alias: str :param iava: Specify an IAVA ID to search with. :type iava: str - :param jvndb: Specify a JVNDB ID to search with. - :type jvndb: str - :param ilvn: Specify an ILVN ID to search with. - :type ilvn: str :param threat_actor: Specify a threat actor name to search with. :type threat_actor: str :param mitre_id: Specify a MITRE ID to search with. @@ -156883,8 +156734,22 @@ async def index_istio_get_with_http_info( :type ransomware: str :param botnet: Specify a botnet name to search with. :type botnet: str - :param published: Specify a published date - :type published: str + :param cidr: Specify an IPv4 or IPv6 CIDR + :type cidr: str + :param asn: Autonomous system number + :type asn: str + :param country: Country name ISO-3166?? format + :type country: str + :param country_code: Country code in ISO-3166?? format + :type country_code: str + :param id: Record type + :type id: str + :param kind: Kind of IpIntel Finding + :type kind: str + :param hostname: Match a string in the list of hostnames + :type hostname: str + :param matches: Search for a string in the field describing the finding + :type matches: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -156921,7 +156786,7 @@ async def index_istio_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_istio_get_serialize( + _param = self._index_ipintel3d_get_serialize( page=page, limit=limit, cursor=cursor, @@ -156931,14 +156796,19 @@ async def index_istio_get_with_http_info( cve=cve, alias=alias, iava=iava, - jvndb=jvndb, - ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, - published=published, + cidr=cidr, + asn=asn, + country=country, + country_code=country_code, + id=id, + kind=kind, + hostname=hostname, + matches=matches, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -156953,7 +156823,7 @@ async def index_istio_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIstioPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination", '404': "str", '500': "str", } @@ -156969,7 +156839,7 @@ async def index_istio_get_with_http_info( @validate_call - async def index_istio_get_without_preload_content( + async def index_ipintel3d_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -156980,14 +156850,19 @@ async def index_istio_get_without_preload_content( cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, - jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, - ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, - published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, + cidr: Annotated[Optional[StrictStr], Field(description="Specify an IPv4 or IPv6 CIDR")] = None, + asn: Annotated[Optional[StrictStr], Field(description="Autonomous system number")] = None, + country: Annotated[Optional[StrictStr], Field(description="Country name ISO-3166?? format")] = None, + country_code: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166?? format")] = None, + id: Annotated[Optional[StrictStr], Field(description="Record type")] = None, + kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, + hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, + matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -157008,9 +156883,9 @@ async def index_istio_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"istio\" + """Return vulnerability data stored in index \"ipintel-3d\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the istio index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Istio Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/istio?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/istio?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-3d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 3-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-3d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-3d?cursor=` :param page: set the page number of the response :type page: int @@ -157030,10 +156905,6 @@ async def index_istio_get_without_preload_content( :type alias: str :param iava: Specify an IAVA ID to search with. :type iava: str - :param jvndb: Specify a JVNDB ID to search with. - :type jvndb: str - :param ilvn: Specify an ILVN ID to search with. - :type ilvn: str :param threat_actor: Specify a threat actor name to search with. :type threat_actor: str :param mitre_id: Specify a MITRE ID to search with. @@ -157044,8 +156915,22 @@ async def index_istio_get_without_preload_content( :type ransomware: str :param botnet: Specify a botnet name to search with. :type botnet: str - :param published: Specify a published date - :type published: str + :param cidr: Specify an IPv4 or IPv6 CIDR + :type cidr: str + :param asn: Autonomous system number + :type asn: str + :param country: Country name ISO-3166?? format + :type country: str + :param country_code: Country code in ISO-3166?? format + :type country_code: str + :param id: Record type + :type id: str + :param kind: Kind of IpIntel Finding + :type kind: str + :param hostname: Match a string in the list of hostnames + :type hostname: str + :param matches: Search for a string in the field describing the finding + :type matches: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -157082,7 +156967,7 @@ async def index_istio_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_istio_get_serialize( + _param = self._index_ipintel3d_get_serialize( page=page, limit=limit, cursor=cursor, @@ -157092,14 +156977,19 @@ async def index_istio_get_without_preload_content( cve=cve, alias=alias, iava=iava, - jvndb=jvndb, - ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, - published=published, + cidr=cidr, + asn=asn, + country=country, + country_code=country_code, + id=id, + kind=kind, + hostname=hostname, + matches=matches, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -157114,7 +157004,7 @@ async def index_istio_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIstioPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination", '404': "str", '500': "str", } @@ -157125,7 +157015,7 @@ async def index_istio_get_without_preload_content( return response_data.response - def _index_istio_get_serialize( + def _index_ipintel3d_get_serialize( self, page, limit, @@ -157136,14 +157026,19 @@ def _index_istio_get_serialize( cve, alias, iava, - jvndb, - ilvn, threat_actor, mitre_id, misp_id, ransomware, botnet, - published, + cidr, + asn, + country, + country_code, + id, + kind, + hostname, + matches, date, updated_at_start_date, updated_at_end_date, @@ -157212,14 +157107,6 @@ def _index_istio_get_serialize( _query_params.append(('iava', iava)) - if jvndb is not None: - - _query_params.append(('jvndb', jvndb)) - - if ilvn is not None: - - _query_params.append(('ilvn', ilvn)) - if threat_actor is not None: _query_params.append(('threat_actor', threat_actor)) @@ -157240,9 +157127,37 @@ def _index_istio_get_serialize( _query_params.append(('botnet', botnet)) - if published is not None: + if cidr is not None: - _query_params.append(('published', published)) + _query_params.append(('cidr', cidr)) + + if asn is not None: + + _query_params.append(('asn', asn)) + + if country is not None: + + _query_params.append(('country', country)) + + if country_code is not None: + + _query_params.append(('country_code', country_code)) + + if id is not None: + + _query_params.append(('id', id)) + + if kind is not None: + + _query_params.append(('kind', kind)) + + if hostname is not None: + + _query_params.append(('hostname', hostname)) + + if matches is not None: + + _query_params.append(('matches', matches)) if date is not None: @@ -157293,7 +157208,7 @@ def _index_istio_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/istio', + resource_path='/v3/index/ipintel-3d', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -157310,7 +157225,7 @@ def _index_istio_get_serialize( @validate_call - async def index_ivanti_get( + async def index_ipintel90d_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -157321,14 +157236,19 @@ async def index_ivanti_get( cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, - jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, - ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, - published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, + cidr: Annotated[Optional[StrictStr], Field(description="Specify an IPv4 or IPv6 CIDR")] = None, + asn: Annotated[Optional[StrictStr], Field(description="Autonomous system number")] = None, + country: Annotated[Optional[StrictStr], Field(description="Country name ISO-3166?? format")] = None, + country_code: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166?? format")] = None, + id: Annotated[Optional[StrictStr], Field(description="Record type")] = None, + kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, + hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, + matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -157348,10 +157268,10 @@ async def index_ivanti_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryIvantiPaginatePagination: - """Return vulnerability data stored in index \"ivanti\" + ) -> RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination: + """Return vulnerability data stored in index \"ipintel-90d\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ivanti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ivanti Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ivanti?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-90d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 90-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-90d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-90d?cursor=` :param page: set the page number of the response :type page: int @@ -157371,10 +157291,6 @@ async def index_ivanti_get( :type alias: str :param iava: Specify an IAVA ID to search with. :type iava: str - :param jvndb: Specify a JVNDB ID to search with. - :type jvndb: str - :param ilvn: Specify an ILVN ID to search with. - :type ilvn: str :param threat_actor: Specify a threat actor name to search with. :type threat_actor: str :param mitre_id: Specify a MITRE ID to search with. @@ -157385,8 +157301,22 @@ async def index_ivanti_get( :type ransomware: str :param botnet: Specify a botnet name to search with. :type botnet: str - :param published: Specify a published date - :type published: str + :param cidr: Specify an IPv4 or IPv6 CIDR + :type cidr: str + :param asn: Autonomous system number + :type asn: str + :param country: Country name ISO-3166?? format + :type country: str + :param country_code: Country code in ISO-3166?? format + :type country_code: str + :param id: Record type + :type id: str + :param kind: Kind of IpIntel Finding + :type kind: str + :param hostname: Match a string in the list of hostnames + :type hostname: str + :param matches: Search for a string in the field describing the finding + :type matches: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -157423,7 +157353,7 @@ async def index_ivanti_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ivanti_get_serialize( + _param = self._index_ipintel90d_get_serialize( page=page, limit=limit, cursor=cursor, @@ -157433,14 +157363,19 @@ async def index_ivanti_get( cve=cve, alias=alias, iava=iava, - jvndb=jvndb, - ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, - published=published, + cidr=cidr, + asn=asn, + country=country, + country_code=country_code, + id=id, + kind=kind, + hostname=hostname, + matches=matches, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -157455,7 +157390,7 @@ async def index_ivanti_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIvantiPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination", '404': "str", '500': "str", } @@ -157471,7 +157406,7 @@ async def index_ivanti_get( @validate_call - async def index_ivanti_get_with_http_info( + async def index_ipintel90d_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -157482,14 +157417,19 @@ async def index_ivanti_get_with_http_info( cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, - jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, - ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, - published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, + cidr: Annotated[Optional[StrictStr], Field(description="Specify an IPv4 or IPv6 CIDR")] = None, + asn: Annotated[Optional[StrictStr], Field(description="Autonomous system number")] = None, + country: Annotated[Optional[StrictStr], Field(description="Country name ISO-3166?? format")] = None, + country_code: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166?? format")] = None, + id: Annotated[Optional[StrictStr], Field(description="Record type")] = None, + kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, + hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, + matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -157509,10 +157449,10 @@ async def index_ivanti_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIvantiPaginatePagination]: - """Return vulnerability data stored in index \"ivanti\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination]: + """Return vulnerability data stored in index \"ipintel-90d\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ivanti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ivanti Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ivanti?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-90d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 90-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-90d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-90d?cursor=` :param page: set the page number of the response :type page: int @@ -157532,10 +157472,6 @@ async def index_ivanti_get_with_http_info( :type alias: str :param iava: Specify an IAVA ID to search with. :type iava: str - :param jvndb: Specify a JVNDB ID to search with. - :type jvndb: str - :param ilvn: Specify an ILVN ID to search with. - :type ilvn: str :param threat_actor: Specify a threat actor name to search with. :type threat_actor: str :param mitre_id: Specify a MITRE ID to search with. @@ -157546,8 +157482,22 @@ async def index_ivanti_get_with_http_info( :type ransomware: str :param botnet: Specify a botnet name to search with. :type botnet: str - :param published: Specify a published date - :type published: str + :param cidr: Specify an IPv4 or IPv6 CIDR + :type cidr: str + :param asn: Autonomous system number + :type asn: str + :param country: Country name ISO-3166?? format + :type country: str + :param country_code: Country code in ISO-3166?? format + :type country_code: str + :param id: Record type + :type id: str + :param kind: Kind of IpIntel Finding + :type kind: str + :param hostname: Match a string in the list of hostnames + :type hostname: str + :param matches: Search for a string in the field describing the finding + :type matches: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -157584,7 +157534,7 @@ async def index_ivanti_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ivanti_get_serialize( + _param = self._index_ipintel90d_get_serialize( page=page, limit=limit, cursor=cursor, @@ -157594,14 +157544,19 @@ async def index_ivanti_get_with_http_info( cve=cve, alias=alias, iava=iava, - jvndb=jvndb, - ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, - published=published, + cidr=cidr, + asn=asn, + country=country, + country_code=country_code, + id=id, + kind=kind, + hostname=hostname, + matches=matches, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -157616,7 +157571,7 @@ async def index_ivanti_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIvantiPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination", '404': "str", '500': "str", } @@ -157632,7 +157587,7 @@ async def index_ivanti_get_with_http_info( @validate_call - async def index_ivanti_get_without_preload_content( + async def index_ipintel90d_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -157643,14 +157598,19 @@ async def index_ivanti_get_without_preload_content( cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, - jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, - ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, - published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, + cidr: Annotated[Optional[StrictStr], Field(description="Specify an IPv4 or IPv6 CIDR")] = None, + asn: Annotated[Optional[StrictStr], Field(description="Autonomous system number")] = None, + country: Annotated[Optional[StrictStr], Field(description="Country name ISO-3166?? format")] = None, + country_code: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166?? format")] = None, + id: Annotated[Optional[StrictStr], Field(description="Record type")] = None, + kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, + hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, + matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -157671,9 +157631,9 @@ async def index_ivanti_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ivanti\" + """Return vulnerability data stored in index \"ipintel-90d\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ivanti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ivanti Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ivanti?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-90d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 90-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-90d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-90d?cursor=` :param page: set the page number of the response :type page: int @@ -157693,10 +157653,6 @@ async def index_ivanti_get_without_preload_content( :type alias: str :param iava: Specify an IAVA ID to search with. :type iava: str - :param jvndb: Specify a JVNDB ID to search with. - :type jvndb: str - :param ilvn: Specify an ILVN ID to search with. - :type ilvn: str :param threat_actor: Specify a threat actor name to search with. :type threat_actor: str :param mitre_id: Specify a MITRE ID to search with. @@ -157707,8 +157663,22 @@ async def index_ivanti_get_without_preload_content( :type ransomware: str :param botnet: Specify a botnet name to search with. :type botnet: str - :param published: Specify a published date - :type published: str + :param cidr: Specify an IPv4 or IPv6 CIDR + :type cidr: str + :param asn: Autonomous system number + :type asn: str + :param country: Country name ISO-3166?? format + :type country: str + :param country_code: Country code in ISO-3166?? format + :type country_code: str + :param id: Record type + :type id: str + :param kind: Kind of IpIntel Finding + :type kind: str + :param hostname: Match a string in the list of hostnames + :type hostname: str + :param matches: Search for a string in the field describing the finding + :type matches: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -157745,7 +157715,7 @@ async def index_ivanti_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ivanti_get_serialize( + _param = self._index_ipintel90d_get_serialize( page=page, limit=limit, cursor=cursor, @@ -157755,14 +157725,19 @@ async def index_ivanti_get_without_preload_content( cve=cve, alias=alias, iava=iava, - jvndb=jvndb, - ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, - published=published, + cidr=cidr, + asn=asn, + country=country, + country_code=country_code, + id=id, + kind=kind, + hostname=hostname, + matches=matches, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -157777,7 +157752,7 @@ async def index_ivanti_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIvantiPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination", '404': "str", '500': "str", } @@ -157788,7 +157763,7 @@ async def index_ivanti_get_without_preload_content( return response_data.response - def _index_ivanti_get_serialize( + def _index_ipintel90d_get_serialize( self, page, limit, @@ -157799,14 +157774,19 @@ def _index_ivanti_get_serialize( cve, alias, iava, - jvndb, - ilvn, threat_actor, mitre_id, misp_id, ransomware, botnet, - published, + cidr, + asn, + country, + country_code, + id, + kind, + hostname, + matches, date, updated_at_start_date, updated_at_end_date, @@ -157875,14 +157855,6 @@ def _index_ivanti_get_serialize( _query_params.append(('iava', iava)) - if jvndb is not None: - - _query_params.append(('jvndb', jvndb)) - - if ilvn is not None: - - _query_params.append(('ilvn', ilvn)) - if threat_actor is not None: _query_params.append(('threat_actor', threat_actor)) @@ -157903,9 +157875,37 @@ def _index_ivanti_get_serialize( _query_params.append(('botnet', botnet)) - if published is not None: + if cidr is not None: - _query_params.append(('published', published)) + _query_params.append(('cidr', cidr)) + + if asn is not None: + + _query_params.append(('asn', asn)) + + if country is not None: + + _query_params.append(('country', country)) + + if country_code is not None: + + _query_params.append(('country_code', country_code)) + + if id is not None: + + _query_params.append(('id', id)) + + if kind is not None: + + _query_params.append(('kind', kind)) + + if hostname is not None: + + _query_params.append(('hostname', hostname)) + + if matches is not None: + + _query_params.append(('matches', matches)) if date is not None: @@ -157956,7 +157956,7 @@ def _index_ivanti_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ivanti', + resource_path='/v3/index/ipintel-90d', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -157973,7 +157973,7 @@ def _index_ivanti_get_serialize( @validate_call - async def index_ivanti_rss_get( + async def index_istio_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -158011,10 +158011,10 @@ async def index_ivanti_rss_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryIvantiRSSPaginatePagination: - """Return vulnerability data stored in index \"ivanti-rss\" + ) -> RenderResponseWithMetadataArrayAdvisoryIstioPaginatePagination: + """Return vulnerability data stored in index \"istio\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ivanti-rss index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ivanti Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti-rss?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ivanti-rss?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the istio index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Istio Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/istio?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/istio?cursor=` :param page: set the page number of the response :type page: int @@ -158086,7 +158086,7 @@ async def index_ivanti_rss_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ivanti_rss_get_serialize( + _param = self._index_istio_get_serialize( page=page, limit=limit, cursor=cursor, @@ -158118,7 +158118,7 @@ async def index_ivanti_rss_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIvantiRSSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIstioPaginatePagination", '404': "str", '500': "str", } @@ -158134,7 +158134,7 @@ async def index_ivanti_rss_get( @validate_call - async def index_ivanti_rss_get_with_http_info( + async def index_istio_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -158172,10 +158172,10 @@ async def index_ivanti_rss_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIvantiRSSPaginatePagination]: - """Return vulnerability data stored in index \"ivanti-rss\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIstioPaginatePagination]: + """Return vulnerability data stored in index \"istio\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ivanti-rss index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ivanti Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti-rss?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ivanti-rss?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the istio index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Istio Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/istio?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/istio?cursor=` :param page: set the page number of the response :type page: int @@ -158247,7 +158247,7 @@ async def index_ivanti_rss_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ivanti_rss_get_serialize( + _param = self._index_istio_get_serialize( page=page, limit=limit, cursor=cursor, @@ -158279,7 +158279,7 @@ async def index_ivanti_rss_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIvantiRSSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIstioPaginatePagination", '404': "str", '500': "str", } @@ -158295,7 +158295,7 @@ async def index_ivanti_rss_get_with_http_info( @validate_call - async def index_ivanti_rss_get_without_preload_content( + async def index_istio_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -158334,9 +158334,9 @@ async def index_ivanti_rss_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ivanti-rss\" + """Return vulnerability data stored in index \"istio\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ivanti-rss index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ivanti Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti-rss?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ivanti-rss?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the istio index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Istio Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/istio?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/istio?cursor=` :param page: set the page number of the response :type page: int @@ -158408,7 +158408,7 @@ async def index_ivanti_rss_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ivanti_rss_get_serialize( + _param = self._index_istio_get_serialize( page=page, limit=limit, cursor=cursor, @@ -158440,7 +158440,7 @@ async def index_ivanti_rss_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIvantiRSSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIstioPaginatePagination", '404': "str", '500': "str", } @@ -158451,7 +158451,7 @@ async def index_ivanti_rss_get_without_preload_content( return response_data.response - def _index_ivanti_rss_get_serialize( + def _index_istio_get_serialize( self, page, limit, @@ -158619,7 +158619,7 @@ def _index_ivanti_rss_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ivanti-rss', + resource_path='/v3/index/istio', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -158636,7 +158636,7 @@ def _index_ivanti_rss_get_serialize( @validate_call - async def index_jenkins_get( + async def index_ivanti_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -158674,10 +158674,10 @@ async def index_jenkins_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryJenkinsPaginatePagination: - """Return vulnerability data stored in index \"jenkins\" + ) -> RenderResponseWithMetadataArrayAdvisoryIvantiPaginatePagination: + """Return vulnerability data stored in index \"ivanti\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jenkins index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Jenkins Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jenkins?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jenkins?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ivanti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ivanti Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ivanti?cursor=` :param page: set the page number of the response :type page: int @@ -158749,7 +158749,7 @@ async def index_jenkins_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jenkins_get_serialize( + _param = self._index_ivanti_get_serialize( page=page, limit=limit, cursor=cursor, @@ -158781,7 +158781,7 @@ async def index_jenkins_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJenkinsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIvantiPaginatePagination", '404': "str", '500': "str", } @@ -158797,7 +158797,7 @@ async def index_jenkins_get( @validate_call - async def index_jenkins_get_with_http_info( + async def index_ivanti_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -158835,10 +158835,10 @@ async def index_jenkins_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJenkinsPaginatePagination]: - """Return vulnerability data stored in index \"jenkins\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIvantiPaginatePagination]: + """Return vulnerability data stored in index \"ivanti\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jenkins index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Jenkins Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jenkins?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jenkins?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ivanti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ivanti Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ivanti?cursor=` :param page: set the page number of the response :type page: int @@ -158910,7 +158910,7 @@ async def index_jenkins_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jenkins_get_serialize( + _param = self._index_ivanti_get_serialize( page=page, limit=limit, cursor=cursor, @@ -158942,7 +158942,7 @@ async def index_jenkins_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJenkinsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIvantiPaginatePagination", '404': "str", '500': "str", } @@ -158958,7 +158958,7 @@ async def index_jenkins_get_with_http_info( @validate_call - async def index_jenkins_get_without_preload_content( + async def index_ivanti_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -158997,9 +158997,9 @@ async def index_jenkins_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"jenkins\" + """Return vulnerability data stored in index \"ivanti\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jenkins index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Jenkins Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jenkins?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jenkins?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ivanti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ivanti Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ivanti?cursor=` :param page: set the page number of the response :type page: int @@ -159071,7 +159071,7 @@ async def index_jenkins_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jenkins_get_serialize( + _param = self._index_ivanti_get_serialize( page=page, limit=limit, cursor=cursor, @@ -159103,7 +159103,7 @@ async def index_jenkins_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJenkinsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIvantiPaginatePagination", '404': "str", '500': "str", } @@ -159114,7 +159114,7 @@ async def index_jenkins_get_without_preload_content( return response_data.response - def _index_jenkins_get_serialize( + def _index_ivanti_get_serialize( self, page, limit, @@ -159282,7 +159282,7 @@ def _index_jenkins_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/jenkins', + resource_path='/v3/index/ivanti', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -159299,7 +159299,7 @@ def _index_jenkins_get_serialize( @validate_call - async def index_jetbrains_get( + async def index_ivanti_rss_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -159337,10 +159337,10 @@ async def index_jetbrains_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryJetBrainsPaginatePagination: - """Return vulnerability data stored in index \"jetbrains\" + ) -> RenderResponseWithMetadataArrayAdvisoryIvantiRSSPaginatePagination: + """Return vulnerability data stored in index \"ivanti-rss\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jetbrains index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** JetBrains Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jetbrains?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jetbrains?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ivanti-rss index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ivanti Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti-rss?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ivanti-rss?cursor=` :param page: set the page number of the response :type page: int @@ -159412,7 +159412,7 @@ async def index_jetbrains_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jetbrains_get_serialize( + _param = self._index_ivanti_rss_get_serialize( page=page, limit=limit, cursor=cursor, @@ -159444,7 +159444,7 @@ async def index_jetbrains_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJetBrainsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIvantiRSSPaginatePagination", '404': "str", '500': "str", } @@ -159460,7 +159460,7 @@ async def index_jetbrains_get( @validate_call - async def index_jetbrains_get_with_http_info( + async def index_ivanti_rss_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -159498,10 +159498,10 @@ async def index_jetbrains_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJetBrainsPaginatePagination]: - """Return vulnerability data stored in index \"jetbrains\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIvantiRSSPaginatePagination]: + """Return vulnerability data stored in index \"ivanti-rss\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jetbrains index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** JetBrains Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jetbrains?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jetbrains?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ivanti-rss index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ivanti Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti-rss?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ivanti-rss?cursor=` :param page: set the page number of the response :type page: int @@ -159573,7 +159573,7 @@ async def index_jetbrains_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jetbrains_get_serialize( + _param = self._index_ivanti_rss_get_serialize( page=page, limit=limit, cursor=cursor, @@ -159605,7 +159605,7 @@ async def index_jetbrains_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJetBrainsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIvantiRSSPaginatePagination", '404': "str", '500': "str", } @@ -159621,7 +159621,7 @@ async def index_jetbrains_get_with_http_info( @validate_call - async def index_jetbrains_get_without_preload_content( + async def index_ivanti_rss_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -159660,9 +159660,9 @@ async def index_jetbrains_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"jetbrains\" + """Return vulnerability data stored in index \"ivanti-rss\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jetbrains index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** JetBrains Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jetbrains?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jetbrains?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ivanti-rss index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ivanti Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti-rss?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ivanti-rss?cursor=` :param page: set the page number of the response :type page: int @@ -159734,7 +159734,7 @@ async def index_jetbrains_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jetbrains_get_serialize( + _param = self._index_ivanti_rss_get_serialize( page=page, limit=limit, cursor=cursor, @@ -159766,7 +159766,7 @@ async def index_jetbrains_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJetBrainsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIvantiRSSPaginatePagination", '404': "str", '500': "str", } @@ -159777,7 +159777,7 @@ async def index_jetbrains_get_without_preload_content( return response_data.response - def _index_jetbrains_get_serialize( + def _index_ivanti_rss_get_serialize( self, page, limit, @@ -159945,7 +159945,7 @@ def _index_jetbrains_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/jetbrains', + resource_path='/v3/index/ivanti-rss', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -159962,7 +159962,7 @@ def _index_jetbrains_get_serialize( @validate_call - async def index_jfrog_get( + async def index_jenkins_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -160000,10 +160000,10 @@ async def index_jfrog_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryJFrogPaginatePagination: - """Return vulnerability data stored in index \"jfrog\" + ) -> RenderResponseWithMetadataArrayAdvisoryJenkinsPaginatePagination: + """Return vulnerability data stored in index \"jenkins\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jfrog index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** JFrog Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jfrog?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jfrog?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jenkins index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Jenkins Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jenkins?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jenkins?cursor=` :param page: set the page number of the response :type page: int @@ -160075,7 +160075,7 @@ async def index_jfrog_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jfrog_get_serialize( + _param = self._index_jenkins_get_serialize( page=page, limit=limit, cursor=cursor, @@ -160107,7 +160107,7 @@ async def index_jfrog_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJFrogPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJenkinsPaginatePagination", '404': "str", '500': "str", } @@ -160123,7 +160123,7 @@ async def index_jfrog_get( @validate_call - async def index_jfrog_get_with_http_info( + async def index_jenkins_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -160161,10 +160161,10 @@ async def index_jfrog_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJFrogPaginatePagination]: - """Return vulnerability data stored in index \"jfrog\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJenkinsPaginatePagination]: + """Return vulnerability data stored in index \"jenkins\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jfrog index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** JFrog Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jfrog?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jfrog?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jenkins index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Jenkins Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jenkins?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jenkins?cursor=` :param page: set the page number of the response :type page: int @@ -160236,7 +160236,7 @@ async def index_jfrog_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jfrog_get_serialize( + _param = self._index_jenkins_get_serialize( page=page, limit=limit, cursor=cursor, @@ -160268,7 +160268,7 @@ async def index_jfrog_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJFrogPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJenkinsPaginatePagination", '404': "str", '500': "str", } @@ -160284,7 +160284,7 @@ async def index_jfrog_get_with_http_info( @validate_call - async def index_jfrog_get_without_preload_content( + async def index_jenkins_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -160323,9 +160323,9 @@ async def index_jfrog_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"jfrog\" + """Return vulnerability data stored in index \"jenkins\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jfrog index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** JFrog Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jfrog?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jfrog?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jenkins index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Jenkins Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jenkins?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jenkins?cursor=` :param page: set the page number of the response :type page: int @@ -160397,7 +160397,7 @@ async def index_jfrog_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jfrog_get_serialize( + _param = self._index_jenkins_get_serialize( page=page, limit=limit, cursor=cursor, @@ -160429,7 +160429,7 @@ async def index_jfrog_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJFrogPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJenkinsPaginatePagination", '404': "str", '500': "str", } @@ -160440,7 +160440,7 @@ async def index_jfrog_get_without_preload_content( return response_data.response - def _index_jfrog_get_serialize( + def _index_jenkins_get_serialize( self, page, limit, @@ -160608,7 +160608,7 @@ def _index_jfrog_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/jfrog', + resource_path='/v3/index/jenkins', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -160625,7 +160625,7 @@ def _index_jfrog_get_serialize( @validate_call - async def index_jnj_get( + async def index_jetbrains_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -160663,10 +160663,10 @@ async def index_jnj_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryJNJAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"jnj\" + ) -> RenderResponseWithMetadataArrayAdvisoryJetBrainsPaginatePagination: + """Return vulnerability data stored in index \"jetbrains\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jnj index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Johnson & Johnson Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jnj?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jnj?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jetbrains index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** JetBrains Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jetbrains?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jetbrains?cursor=` :param page: set the page number of the response :type page: int @@ -160738,7 +160738,7 @@ async def index_jnj_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jnj_get_serialize( + _param = self._index_jetbrains_get_serialize( page=page, limit=limit, cursor=cursor, @@ -160770,7 +160770,7 @@ async def index_jnj_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJNJAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJetBrainsPaginatePagination", '404': "str", '500': "str", } @@ -160786,7 +160786,7 @@ async def index_jnj_get( @validate_call - async def index_jnj_get_with_http_info( + async def index_jetbrains_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -160824,10 +160824,10 @@ async def index_jnj_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJNJAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"jnj\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJetBrainsPaginatePagination]: + """Return vulnerability data stored in index \"jetbrains\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jnj index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Johnson & Johnson Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jnj?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jnj?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jetbrains index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** JetBrains Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jetbrains?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jetbrains?cursor=` :param page: set the page number of the response :type page: int @@ -160899,7 +160899,7 @@ async def index_jnj_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jnj_get_serialize( + _param = self._index_jetbrains_get_serialize( page=page, limit=limit, cursor=cursor, @@ -160931,7 +160931,7 @@ async def index_jnj_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJNJAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJetBrainsPaginatePagination", '404': "str", '500': "str", } @@ -160947,7 +160947,7 @@ async def index_jnj_get_with_http_info( @validate_call - async def index_jnj_get_without_preload_content( + async def index_jetbrains_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -160986,9 +160986,9 @@ async def index_jnj_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"jnj\" + """Return vulnerability data stored in index \"jetbrains\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jnj index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Johnson & Johnson Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jnj?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jnj?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jetbrains index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** JetBrains Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jetbrains?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jetbrains?cursor=` :param page: set the page number of the response :type page: int @@ -161060,7 +161060,7 @@ async def index_jnj_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jnj_get_serialize( + _param = self._index_jetbrains_get_serialize( page=page, limit=limit, cursor=cursor, @@ -161092,7 +161092,7 @@ async def index_jnj_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJNJAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJetBrainsPaginatePagination", '404': "str", '500': "str", } @@ -161103,7 +161103,7 @@ async def index_jnj_get_without_preload_content( return response_data.response - def _index_jnj_get_serialize( + def _index_jetbrains_get_serialize( self, page, limit, @@ -161271,7 +161271,7 @@ def _index_jnj_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/jnj', + resource_path='/v3/index/jetbrains', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -161288,7 +161288,7 @@ def _index_jnj_get_serialize( @validate_call - async def index_johnson_controls_get( + async def index_jfrog_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -161326,10 +161326,10 @@ async def index_johnson_controls_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryJohnsonControlsPaginatePagination: - """Return vulnerability data stored in index \"johnson-controls\" + ) -> RenderResponseWithMetadataArrayAdvisoryJFrogPaginatePagination: + """Return vulnerability data stored in index \"jfrog\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the johnson-controls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Security Advisories - Johnson Controls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/johnson-controls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/johnson-controls?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jfrog index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** JFrog Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jfrog?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jfrog?cursor=` :param page: set the page number of the response :type page: int @@ -161401,7 +161401,7 @@ async def index_johnson_controls_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_johnson_controls_get_serialize( + _param = self._index_jfrog_get_serialize( page=page, limit=limit, cursor=cursor, @@ -161433,7 +161433,7 @@ async def index_johnson_controls_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJohnsonControlsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJFrogPaginatePagination", '404': "str", '500': "str", } @@ -161449,7 +161449,7 @@ async def index_johnson_controls_get( @validate_call - async def index_johnson_controls_get_with_http_info( + async def index_jfrog_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -161487,10 +161487,10 @@ async def index_johnson_controls_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJohnsonControlsPaginatePagination]: - """Return vulnerability data stored in index \"johnson-controls\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJFrogPaginatePagination]: + """Return vulnerability data stored in index \"jfrog\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the johnson-controls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Security Advisories - Johnson Controls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/johnson-controls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/johnson-controls?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jfrog index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** JFrog Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jfrog?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jfrog?cursor=` :param page: set the page number of the response :type page: int @@ -161562,7 +161562,7 @@ async def index_johnson_controls_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_johnson_controls_get_serialize( + _param = self._index_jfrog_get_serialize( page=page, limit=limit, cursor=cursor, @@ -161594,7 +161594,7 @@ async def index_johnson_controls_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJohnsonControlsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJFrogPaginatePagination", '404': "str", '500': "str", } @@ -161610,7 +161610,7 @@ async def index_johnson_controls_get_with_http_info( @validate_call - async def index_johnson_controls_get_without_preload_content( + async def index_jfrog_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -161649,9 +161649,9 @@ async def index_johnson_controls_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"johnson-controls\" + """Return vulnerability data stored in index \"jfrog\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the johnson-controls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Security Advisories - Johnson Controls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/johnson-controls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/johnson-controls?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jfrog index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** JFrog Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jfrog?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jfrog?cursor=` :param page: set the page number of the response :type page: int @@ -161723,7 +161723,7 @@ async def index_johnson_controls_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_johnson_controls_get_serialize( + _param = self._index_jfrog_get_serialize( page=page, limit=limit, cursor=cursor, @@ -161755,7 +161755,7 @@ async def index_johnson_controls_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJohnsonControlsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJFrogPaginatePagination", '404': "str", '500': "str", } @@ -161766,7 +161766,7 @@ async def index_johnson_controls_get_without_preload_content( return response_data.response - def _index_johnson_controls_get_serialize( + def _index_jfrog_get_serialize( self, page, limit, @@ -161934,7 +161934,7 @@ def _index_johnson_controls_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/johnson-controls', + resource_path='/v3/index/jfrog', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -161951,7 +161951,7 @@ def _index_johnson_controls_get_serialize( @validate_call - async def index_juniper_get( + async def index_jnj_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -161989,10 +161989,10 @@ async def index_juniper_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryJuniperPaginatePagination: - """Return vulnerability data stored in index \"juniper\" + ) -> RenderResponseWithMetadataArrayAdvisoryJNJAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"jnj\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the juniper index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Juniper Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/juniper?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/juniper?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jnj index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Johnson & Johnson Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jnj?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jnj?cursor=` :param page: set the page number of the response :type page: int @@ -162064,7 +162064,7 @@ async def index_juniper_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_juniper_get_serialize( + _param = self._index_jnj_get_serialize( page=page, limit=limit, cursor=cursor, @@ -162096,7 +162096,7 @@ async def index_juniper_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJuniperPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJNJAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -162112,7 +162112,7 @@ async def index_juniper_get( @validate_call - async def index_juniper_get_with_http_info( + async def index_jnj_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -162150,10 +162150,10 @@ async def index_juniper_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJuniperPaginatePagination]: - """Return vulnerability data stored in index \"juniper\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJNJAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"jnj\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the juniper index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Juniper Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/juniper?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/juniper?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jnj index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Johnson & Johnson Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jnj?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jnj?cursor=` :param page: set the page number of the response :type page: int @@ -162225,7 +162225,7 @@ async def index_juniper_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_juniper_get_serialize( + _param = self._index_jnj_get_serialize( page=page, limit=limit, cursor=cursor, @@ -162257,7 +162257,7 @@ async def index_juniper_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJuniperPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJNJAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -162273,7 +162273,7 @@ async def index_juniper_get_with_http_info( @validate_call - async def index_juniper_get_without_preload_content( + async def index_jnj_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -162312,9 +162312,9 @@ async def index_juniper_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"juniper\" + """Return vulnerability data stored in index \"jnj\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the juniper index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Juniper Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/juniper?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/juniper?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jnj index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Johnson & Johnson Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jnj?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jnj?cursor=` :param page: set the page number of the response :type page: int @@ -162386,7 +162386,7 @@ async def index_juniper_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_juniper_get_serialize( + _param = self._index_jnj_get_serialize( page=page, limit=limit, cursor=cursor, @@ -162418,7 +162418,7 @@ async def index_juniper_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJuniperPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJNJAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -162429,7 +162429,7 @@ async def index_juniper_get_without_preload_content( return response_data.response - def _index_juniper_get_serialize( + def _index_jnj_get_serialize( self, page, limit, @@ -162597,7 +162597,7 @@ def _index_juniper_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/juniper', + resource_path='/v3/index/jnj', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -162614,7 +162614,7 @@ def _index_juniper_get_serialize( @validate_call - async def index_jvn_get( + async def index_johnson_controls_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -162652,10 +162652,10 @@ async def index_jvn_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryJVNPaginatePagination: - """Return vulnerability data stored in index \"jvn\" + ) -> RenderResponseWithMetadataArrayAdvisoryJohnsonControlsPaginatePagination: + """Return vulnerability data stored in index \"johnson-controls\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jvn index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Japan Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jvn?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jvn?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the johnson-controls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Security Advisories - Johnson Controls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/johnson-controls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/johnson-controls?cursor=` :param page: set the page number of the response :type page: int @@ -162727,7 +162727,7 @@ async def index_jvn_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jvn_get_serialize( + _param = self._index_johnson_controls_get_serialize( page=page, limit=limit, cursor=cursor, @@ -162759,7 +162759,7 @@ async def index_jvn_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJVNPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJohnsonControlsPaginatePagination", '404': "str", '500': "str", } @@ -162775,7 +162775,7 @@ async def index_jvn_get( @validate_call - async def index_jvn_get_with_http_info( + async def index_johnson_controls_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -162813,10 +162813,10 @@ async def index_jvn_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJVNPaginatePagination]: - """Return vulnerability data stored in index \"jvn\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJohnsonControlsPaginatePagination]: + """Return vulnerability data stored in index \"johnson-controls\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jvn index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Japan Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jvn?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jvn?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the johnson-controls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Security Advisories - Johnson Controls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/johnson-controls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/johnson-controls?cursor=` :param page: set the page number of the response :type page: int @@ -162888,7 +162888,7 @@ async def index_jvn_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jvn_get_serialize( + _param = self._index_johnson_controls_get_serialize( page=page, limit=limit, cursor=cursor, @@ -162920,7 +162920,7 @@ async def index_jvn_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJVNPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJohnsonControlsPaginatePagination", '404': "str", '500': "str", } @@ -162936,7 +162936,7 @@ async def index_jvn_get_with_http_info( @validate_call - async def index_jvn_get_without_preload_content( + async def index_johnson_controls_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -162975,9 +162975,9 @@ async def index_jvn_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"jvn\" + """Return vulnerability data stored in index \"johnson-controls\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jvn index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Japan Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jvn?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jvn?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the johnson-controls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Security Advisories - Johnson Controls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/johnson-controls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/johnson-controls?cursor=` :param page: set the page number of the response :type page: int @@ -163049,7 +163049,7 @@ async def index_jvn_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jvn_get_serialize( + _param = self._index_johnson_controls_get_serialize( page=page, limit=limit, cursor=cursor, @@ -163081,7 +163081,7 @@ async def index_jvn_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJVNPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJohnsonControlsPaginatePagination", '404': "str", '500': "str", } @@ -163092,7 +163092,7 @@ async def index_jvn_get_without_preload_content( return response_data.response - def _index_jvn_get_serialize( + def _index_johnson_controls_get_serialize( self, page, limit, @@ -163260,7 +163260,7 @@ def _index_jvn_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/jvn', + resource_path='/v3/index/johnson-controls', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -163277,7 +163277,7 @@ def _index_jvn_get_serialize( @validate_call - async def index_jvndb_get( + async def index_juniper_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -163315,10 +163315,10 @@ async def index_jvndb_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryJVNAdvisoryItemPaginatePagination: - """Return vulnerability data stored in index \"jvndb\" + ) -> RenderResponseWithMetadataArrayAdvisoryJuniperPaginatePagination: + """Return vulnerability data stored in index \"juniper\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jvndb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Japan Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jvndb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jvndb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the juniper index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Juniper Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/juniper?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/juniper?cursor=` :param page: set the page number of the response :type page: int @@ -163390,7 +163390,7 @@ async def index_jvndb_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jvndb_get_serialize( + _param = self._index_juniper_get_serialize( page=page, limit=limit, cursor=cursor, @@ -163422,7 +163422,7 @@ async def index_jvndb_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJVNAdvisoryItemPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJuniperPaginatePagination", '404': "str", '500': "str", } @@ -163438,7 +163438,7 @@ async def index_jvndb_get( @validate_call - async def index_jvndb_get_with_http_info( + async def index_juniper_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -163476,10 +163476,10 @@ async def index_jvndb_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJVNAdvisoryItemPaginatePagination]: - """Return vulnerability data stored in index \"jvndb\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJuniperPaginatePagination]: + """Return vulnerability data stored in index \"juniper\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jvndb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Japan Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jvndb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jvndb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the juniper index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Juniper Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/juniper?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/juniper?cursor=` :param page: set the page number of the response :type page: int @@ -163551,7 +163551,7 @@ async def index_jvndb_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jvndb_get_serialize( + _param = self._index_juniper_get_serialize( page=page, limit=limit, cursor=cursor, @@ -163583,7 +163583,7 @@ async def index_jvndb_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJVNAdvisoryItemPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJuniperPaginatePagination", '404': "str", '500': "str", } @@ -163599,7 +163599,7 @@ async def index_jvndb_get_with_http_info( @validate_call - async def index_jvndb_get_without_preload_content( + async def index_juniper_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -163638,9 +163638,9 @@ async def index_jvndb_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"jvndb\" + """Return vulnerability data stored in index \"juniper\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jvndb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Japan Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jvndb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jvndb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the juniper index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Juniper Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/juniper?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/juniper?cursor=` :param page: set the page number of the response :type page: int @@ -163712,7 +163712,7 @@ async def index_jvndb_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jvndb_get_serialize( + _param = self._index_juniper_get_serialize( page=page, limit=limit, cursor=cursor, @@ -163744,7 +163744,7 @@ async def index_jvndb_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJVNAdvisoryItemPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJuniperPaginatePagination", '404': "str", '500': "str", } @@ -163755,7 +163755,7 @@ async def index_jvndb_get_without_preload_content( return response_data.response - def _index_jvndb_get_serialize( + def _index_juniper_get_serialize( self, page, limit, @@ -163923,7 +163923,7 @@ def _index_jvndb_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/jvndb', + resource_path='/v3/index/juniper', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -163940,7 +163940,7 @@ def _index_jvndb_get_serialize( @validate_call - async def index_kaspersky_ics_cert_get( + async def index_jvn_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -163978,10 +163978,10 @@ async def index_kaspersky_ics_cert_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryKasperskyICSCERTAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"kaspersky-ics-cert\" + ) -> RenderResponseWithMetadataArrayAdvisoryJVNPaginatePagination: + """Return vulnerability data stored in index \"jvn\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kaspersky-ics-cert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Kaspersky ICS CERT ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kaspersky-ics-cert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kaspersky-ics-cert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jvn index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Japan Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jvn?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jvn?cursor=` :param page: set the page number of the response :type page: int @@ -164053,7 +164053,7 @@ async def index_kaspersky_ics_cert_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_kaspersky_ics_cert_get_serialize( + _param = self._index_jvn_get_serialize( page=page, limit=limit, cursor=cursor, @@ -164085,7 +164085,7 @@ async def index_kaspersky_ics_cert_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryKasperskyICSCERTAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJVNPaginatePagination", '404': "str", '500': "str", } @@ -164101,7 +164101,7 @@ async def index_kaspersky_ics_cert_get( @validate_call - async def index_kaspersky_ics_cert_get_with_http_info( + async def index_jvn_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -164139,10 +164139,10 @@ async def index_kaspersky_ics_cert_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryKasperskyICSCERTAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"kaspersky-ics-cert\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJVNPaginatePagination]: + """Return vulnerability data stored in index \"jvn\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kaspersky-ics-cert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Kaspersky ICS CERT ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kaspersky-ics-cert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kaspersky-ics-cert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jvn index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Japan Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jvn?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jvn?cursor=` :param page: set the page number of the response :type page: int @@ -164214,7 +164214,7 @@ async def index_kaspersky_ics_cert_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_kaspersky_ics_cert_get_serialize( + _param = self._index_jvn_get_serialize( page=page, limit=limit, cursor=cursor, @@ -164246,7 +164246,7 @@ async def index_kaspersky_ics_cert_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryKasperskyICSCERTAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJVNPaginatePagination", '404': "str", '500': "str", } @@ -164262,7 +164262,7 @@ async def index_kaspersky_ics_cert_get_with_http_info( @validate_call - async def index_kaspersky_ics_cert_get_without_preload_content( + async def index_jvn_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -164301,9 +164301,9 @@ async def index_kaspersky_ics_cert_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"kaspersky-ics-cert\" + """Return vulnerability data stored in index \"jvn\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kaspersky-ics-cert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Kaspersky ICS CERT ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kaspersky-ics-cert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kaspersky-ics-cert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jvn index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Japan Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jvn?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jvn?cursor=` :param page: set the page number of the response :type page: int @@ -164375,7 +164375,7 @@ async def index_kaspersky_ics_cert_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_kaspersky_ics_cert_get_serialize( + _param = self._index_jvn_get_serialize( page=page, limit=limit, cursor=cursor, @@ -164407,7 +164407,7 @@ async def index_kaspersky_ics_cert_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryKasperskyICSCERTAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJVNPaginatePagination", '404': "str", '500': "str", } @@ -164418,7 +164418,7 @@ async def index_kaspersky_ics_cert_get_without_preload_content( return response_data.response - def _index_kaspersky_ics_cert_get_serialize( + def _index_jvn_get_serialize( self, page, limit, @@ -164586,7 +164586,7 @@ def _index_kaspersky_ics_cert_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/kaspersky-ics-cert', + resource_path='/v3/index/jvn', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -164603,7 +164603,7 @@ def _index_kaspersky_ics_cert_get_serialize( @validate_call - async def index_korelogic_get( + async def index_jvndb_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -164641,10 +164641,10 @@ async def index_korelogic_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryKoreLogicPaginatePagination: - """Return vulnerability data stored in index \"korelogic\" + ) -> RenderResponseWithMetadataArrayAdvisoryJVNAdvisoryItemPaginatePagination: + """Return vulnerability data stored in index \"jvndb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the korelogic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KoreLogic Vulnerability Research and Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/korelogic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/korelogic?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jvndb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Japan Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jvndb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jvndb?cursor=` :param page: set the page number of the response :type page: int @@ -164716,7 +164716,7 @@ async def index_korelogic_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_korelogic_get_serialize( + _param = self._index_jvndb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -164748,7 +164748,7 @@ async def index_korelogic_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryKoreLogicPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJVNAdvisoryItemPaginatePagination", '404': "str", '500': "str", } @@ -164764,7 +164764,7 @@ async def index_korelogic_get( @validate_call - async def index_korelogic_get_with_http_info( + async def index_jvndb_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -164802,10 +164802,10 @@ async def index_korelogic_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryKoreLogicPaginatePagination]: - """Return vulnerability data stored in index \"korelogic\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJVNAdvisoryItemPaginatePagination]: + """Return vulnerability data stored in index \"jvndb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the korelogic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KoreLogic Vulnerability Research and Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/korelogic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/korelogic?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jvndb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Japan Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jvndb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jvndb?cursor=` :param page: set the page number of the response :type page: int @@ -164877,7 +164877,7 @@ async def index_korelogic_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_korelogic_get_serialize( + _param = self._index_jvndb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -164909,7 +164909,7 @@ async def index_korelogic_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryKoreLogicPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJVNAdvisoryItemPaginatePagination", '404': "str", '500': "str", } @@ -164925,7 +164925,7 @@ async def index_korelogic_get_with_http_info( @validate_call - async def index_korelogic_get_without_preload_content( + async def index_jvndb_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -164964,9 +164964,9 @@ async def index_korelogic_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"korelogic\" + """Return vulnerability data stored in index \"jvndb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the korelogic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KoreLogic Vulnerability Research and Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/korelogic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/korelogic?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jvndb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Japan Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jvndb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jvndb?cursor=` :param page: set the page number of the response :type page: int @@ -165038,7 +165038,7 @@ async def index_korelogic_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_korelogic_get_serialize( + _param = self._index_jvndb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -165070,7 +165070,7 @@ async def index_korelogic_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryKoreLogicPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJVNAdvisoryItemPaginatePagination", '404': "str", '500': "str", } @@ -165081,7 +165081,7 @@ async def index_korelogic_get_without_preload_content( return response_data.response - def _index_korelogic_get_serialize( + def _index_jvndb_get_serialize( self, page, limit, @@ -165249,7 +165249,7 @@ def _index_korelogic_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/korelogic', + resource_path='/v3/index/jvndb', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -165266,7 +165266,7 @@ def _index_korelogic_get_serialize( @validate_call - async def index_krcert_security_notices_get( + async def index_kaspersky_ics_cert_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -165304,10 +165304,10 @@ async def index_krcert_security_notices_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"krcert-security-notices\" + ) -> RenderResponseWithMetadataArrayAdvisoryKasperskyICSCERTAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"kaspersky-ics-cert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the krcert-security-notices index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KR-CERT Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-security-notices?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/krcert-security-notices?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kaspersky-ics-cert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Kaspersky ICS CERT ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kaspersky-ics-cert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kaspersky-ics-cert?cursor=` :param page: set the page number of the response :type page: int @@ -165379,7 +165379,7 @@ async def index_krcert_security_notices_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_krcert_security_notices_get_serialize( + _param = self._index_kaspersky_ics_cert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -165411,7 +165411,7 @@ async def index_krcert_security_notices_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryKasperskyICSCERTAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -165427,7 +165427,7 @@ async def index_krcert_security_notices_get( @validate_call - async def index_krcert_security_notices_get_with_http_info( + async def index_kaspersky_ics_cert_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -165465,10 +165465,10 @@ async def index_krcert_security_notices_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"krcert-security-notices\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryKasperskyICSCERTAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"kaspersky-ics-cert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the krcert-security-notices index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KR-CERT Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-security-notices?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/krcert-security-notices?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kaspersky-ics-cert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Kaspersky ICS CERT ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kaspersky-ics-cert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kaspersky-ics-cert?cursor=` :param page: set the page number of the response :type page: int @@ -165540,7 +165540,7 @@ async def index_krcert_security_notices_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_krcert_security_notices_get_serialize( + _param = self._index_kaspersky_ics_cert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -165572,7 +165572,7 @@ async def index_krcert_security_notices_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryKasperskyICSCERTAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -165588,7 +165588,7 @@ async def index_krcert_security_notices_get_with_http_info( @validate_call - async def index_krcert_security_notices_get_without_preload_content( + async def index_kaspersky_ics_cert_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -165627,9 +165627,9 @@ async def index_krcert_security_notices_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"krcert-security-notices\" + """Return vulnerability data stored in index \"kaspersky-ics-cert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the krcert-security-notices index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KR-CERT Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-security-notices?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/krcert-security-notices?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kaspersky-ics-cert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Kaspersky ICS CERT ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kaspersky-ics-cert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kaspersky-ics-cert?cursor=` :param page: set the page number of the response :type page: int @@ -165701,7 +165701,7 @@ async def index_krcert_security_notices_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_krcert_security_notices_get_serialize( + _param = self._index_kaspersky_ics_cert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -165733,7 +165733,7 @@ async def index_krcert_security_notices_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryKasperskyICSCERTAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -165744,7 +165744,7 @@ async def index_krcert_security_notices_get_without_preload_content( return response_data.response - def _index_krcert_security_notices_get_serialize( + def _index_kaspersky_ics_cert_get_serialize( self, page, limit, @@ -165912,7 +165912,7 @@ def _index_krcert_security_notices_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/krcert-security-notices', + resource_path='/v3/index/kaspersky-ics-cert', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -165929,7 +165929,7 @@ def _index_krcert_security_notices_get_serialize( @validate_call - async def index_krcert_vulnerabilities_get( + async def index_korelogic_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -165967,10 +165967,10 @@ async def index_krcert_vulnerabilities_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"krcert-vulnerabilities\" + ) -> RenderResponseWithMetadataArrayAdvisoryKoreLogicPaginatePagination: + """Return vulnerability data stored in index \"korelogic\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the krcert-vulnerabilities index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KR-CERT Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-vulnerabilities?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/krcert-vulnerabilities?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the korelogic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KoreLogic Vulnerability Research and Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/korelogic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/korelogic?cursor=` :param page: set the page number of the response :type page: int @@ -166042,7 +166042,7 @@ async def index_krcert_vulnerabilities_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_krcert_vulnerabilities_get_serialize( + _param = self._index_korelogic_get_serialize( page=page, limit=limit, cursor=cursor, @@ -166074,7 +166074,7 @@ async def index_krcert_vulnerabilities_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryKoreLogicPaginatePagination", '404': "str", '500': "str", } @@ -166090,7 +166090,7 @@ async def index_krcert_vulnerabilities_get( @validate_call - async def index_krcert_vulnerabilities_get_with_http_info( + async def index_korelogic_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -166128,10 +166128,10 @@ async def index_krcert_vulnerabilities_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"krcert-vulnerabilities\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryKoreLogicPaginatePagination]: + """Return vulnerability data stored in index \"korelogic\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the krcert-vulnerabilities index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KR-CERT Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-vulnerabilities?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/krcert-vulnerabilities?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the korelogic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KoreLogic Vulnerability Research and Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/korelogic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/korelogic?cursor=` :param page: set the page number of the response :type page: int @@ -166203,7 +166203,7 @@ async def index_krcert_vulnerabilities_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_krcert_vulnerabilities_get_serialize( + _param = self._index_korelogic_get_serialize( page=page, limit=limit, cursor=cursor, @@ -166235,7 +166235,7 @@ async def index_krcert_vulnerabilities_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryKoreLogicPaginatePagination", '404': "str", '500': "str", } @@ -166251,7 +166251,7 @@ async def index_krcert_vulnerabilities_get_with_http_info( @validate_call - async def index_krcert_vulnerabilities_get_without_preload_content( + async def index_korelogic_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -166290,9 +166290,9 @@ async def index_krcert_vulnerabilities_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"krcert-vulnerabilities\" + """Return vulnerability data stored in index \"korelogic\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the krcert-vulnerabilities index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KR-CERT Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-vulnerabilities?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/krcert-vulnerabilities?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the korelogic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KoreLogic Vulnerability Research and Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/korelogic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/korelogic?cursor=` :param page: set the page number of the response :type page: int @@ -166364,7 +166364,7 @@ async def index_krcert_vulnerabilities_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_krcert_vulnerabilities_get_serialize( + _param = self._index_korelogic_get_serialize( page=page, limit=limit, cursor=cursor, @@ -166396,7 +166396,7 @@ async def index_krcert_vulnerabilities_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryKoreLogicPaginatePagination", '404': "str", '500': "str", } @@ -166407,7 +166407,7 @@ async def index_krcert_vulnerabilities_get_without_preload_content( return response_data.response - def _index_krcert_vulnerabilities_get_serialize( + def _index_korelogic_get_serialize( self, page, limit, @@ -166575,7 +166575,7 @@ def _index_krcert_vulnerabilities_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/krcert-vulnerabilities', + resource_path='/v3/index/korelogic', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -166592,7 +166592,7 @@ def _index_krcert_vulnerabilities_get_serialize( @validate_call - async def index_kubernetes_get( + async def index_krcert_security_notices_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -166630,10 +166630,10 @@ async def index_kubernetes_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryK8SPaginatePagination: - """Return vulnerability data stored in index \"kubernetes\" + ) -> RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"krcert-security-notices\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kubernetes index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Kubernetes Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kubernetes?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kubernetes?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the krcert-security-notices index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KR-CERT Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-security-notices?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/krcert-security-notices?cursor=` :param page: set the page number of the response :type page: int @@ -166705,7 +166705,7 @@ async def index_kubernetes_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_kubernetes_get_serialize( + _param = self._index_krcert_security_notices_get_serialize( page=page, limit=limit, cursor=cursor, @@ -166737,7 +166737,7 @@ async def index_kubernetes_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryK8SPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -166753,7 +166753,7 @@ async def index_kubernetes_get( @validate_call - async def index_kubernetes_get_with_http_info( + async def index_krcert_security_notices_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -166791,10 +166791,10 @@ async def index_kubernetes_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryK8SPaginatePagination]: - """Return vulnerability data stored in index \"kubernetes\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"krcert-security-notices\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kubernetes index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Kubernetes Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kubernetes?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kubernetes?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the krcert-security-notices index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KR-CERT Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-security-notices?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/krcert-security-notices?cursor=` :param page: set the page number of the response :type page: int @@ -166866,7 +166866,7 @@ async def index_kubernetes_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_kubernetes_get_serialize( + _param = self._index_krcert_security_notices_get_serialize( page=page, limit=limit, cursor=cursor, @@ -166898,7 +166898,7 @@ async def index_kubernetes_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryK8SPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -166914,7 +166914,7 @@ async def index_kubernetes_get_with_http_info( @validate_call - async def index_kubernetes_get_without_preload_content( + async def index_krcert_security_notices_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -166953,9 +166953,9 @@ async def index_kubernetes_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"kubernetes\" + """Return vulnerability data stored in index \"krcert-security-notices\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kubernetes index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Kubernetes Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kubernetes?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kubernetes?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the krcert-security-notices index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KR-CERT Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-security-notices?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/krcert-security-notices?cursor=` :param page: set the page number of the response :type page: int @@ -167027,7 +167027,7 @@ async def index_kubernetes_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_kubernetes_get_serialize( + _param = self._index_krcert_security_notices_get_serialize( page=page, limit=limit, cursor=cursor, @@ -167059,7 +167059,7 @@ async def index_kubernetes_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryK8SPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -167070,7 +167070,7 @@ async def index_kubernetes_get_without_preload_content( return response_data.response - def _index_kubernetes_get_serialize( + def _index_krcert_security_notices_get_serialize( self, page, limit, @@ -167238,7 +167238,7 @@ def _index_kubernetes_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/kubernetes', + resource_path='/v3/index/krcert-security-notices', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -167255,7 +167255,7 @@ def _index_kubernetes_get_serialize( @validate_call - async def index_kunbus_get( + async def index_krcert_vulnerabilities_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -167293,10 +167293,10 @@ async def index_kunbus_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryKunbusPaginatePagination: - """Return vulnerability data stored in index \"kunbus\" + ) -> RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"krcert-vulnerabilities\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kunbus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KunBus Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kunbus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kunbus?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the krcert-vulnerabilities index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KR-CERT Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-vulnerabilities?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/krcert-vulnerabilities?cursor=` :param page: set the page number of the response :type page: int @@ -167368,7 +167368,7 @@ async def index_kunbus_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_kunbus_get_serialize( + _param = self._index_krcert_vulnerabilities_get_serialize( page=page, limit=limit, cursor=cursor, @@ -167400,7 +167400,7 @@ async def index_kunbus_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryKunbusPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -167416,7 +167416,7 @@ async def index_kunbus_get( @validate_call - async def index_kunbus_get_with_http_info( + async def index_krcert_vulnerabilities_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -167454,10 +167454,10 @@ async def index_kunbus_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryKunbusPaginatePagination]: - """Return vulnerability data stored in index \"kunbus\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"krcert-vulnerabilities\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kunbus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KunBus Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kunbus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kunbus?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the krcert-vulnerabilities index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KR-CERT Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-vulnerabilities?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/krcert-vulnerabilities?cursor=` :param page: set the page number of the response :type page: int @@ -167529,7 +167529,7 @@ async def index_kunbus_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_kunbus_get_serialize( + _param = self._index_krcert_vulnerabilities_get_serialize( page=page, limit=limit, cursor=cursor, @@ -167561,7 +167561,7 @@ async def index_kunbus_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryKunbusPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -167577,7 +167577,7 @@ async def index_kunbus_get_with_http_info( @validate_call - async def index_kunbus_get_without_preload_content( + async def index_krcert_vulnerabilities_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -167616,9 +167616,9 @@ async def index_kunbus_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"kunbus\" + """Return vulnerability data stored in index \"krcert-vulnerabilities\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kunbus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KunBus Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kunbus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kunbus?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the krcert-vulnerabilities index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KR-CERT Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-vulnerabilities?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/krcert-vulnerabilities?cursor=` :param page: set the page number of the response :type page: int @@ -167690,7 +167690,7 @@ async def index_kunbus_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_kunbus_get_serialize( + _param = self._index_krcert_vulnerabilities_get_serialize( page=page, limit=limit, cursor=cursor, @@ -167722,7 +167722,7 @@ async def index_kunbus_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryKunbusPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -167733,7 +167733,7 @@ async def index_kunbus_get_without_preload_content( return response_data.response - def _index_kunbus_get_serialize( + def _index_krcert_vulnerabilities_get_serialize( self, page, limit, @@ -167901,7 +167901,7 @@ def _index_kunbus_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/kunbus', + resource_path='/v3/index/krcert-vulnerabilities', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -167918,7 +167918,7 @@ def _index_kunbus_get_serialize( @validate_call - async def index_lantronix_get( + async def index_kubernetes_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -167956,10 +167956,10 @@ async def index_lantronix_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryLantronixPaginatePagination: - """Return vulnerability data stored in index \"lantronix\" + ) -> RenderResponseWithMetadataArrayAdvisoryK8SPaginatePagination: + """Return vulnerability data stored in index \"kubernetes\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lantronix index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lantronix Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lantronix?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lantronix?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kubernetes index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Kubernetes Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kubernetes?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kubernetes?cursor=` :param page: set the page number of the response :type page: int @@ -168031,7 +168031,7 @@ async def index_lantronix_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_lantronix_get_serialize( + _param = self._index_kubernetes_get_serialize( page=page, limit=limit, cursor=cursor, @@ -168063,7 +168063,7 @@ async def index_lantronix_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLantronixPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryK8SPaginatePagination", '404': "str", '500': "str", } @@ -168079,7 +168079,7 @@ async def index_lantronix_get( @validate_call - async def index_lantronix_get_with_http_info( + async def index_kubernetes_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -168117,10 +168117,10 @@ async def index_lantronix_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLantronixPaginatePagination]: - """Return vulnerability data stored in index \"lantronix\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryK8SPaginatePagination]: + """Return vulnerability data stored in index \"kubernetes\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lantronix index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lantronix Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lantronix?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lantronix?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kubernetes index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Kubernetes Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kubernetes?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kubernetes?cursor=` :param page: set the page number of the response :type page: int @@ -168192,7 +168192,7 @@ async def index_lantronix_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_lantronix_get_serialize( + _param = self._index_kubernetes_get_serialize( page=page, limit=limit, cursor=cursor, @@ -168224,7 +168224,7 @@ async def index_lantronix_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLantronixPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryK8SPaginatePagination", '404': "str", '500': "str", } @@ -168240,7 +168240,7 @@ async def index_lantronix_get_with_http_info( @validate_call - async def index_lantronix_get_without_preload_content( + async def index_kubernetes_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -168279,9 +168279,9 @@ async def index_lantronix_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"lantronix\" + """Return vulnerability data stored in index \"kubernetes\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lantronix index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lantronix Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lantronix?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lantronix?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kubernetes index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Kubernetes Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kubernetes?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kubernetes?cursor=` :param page: set the page number of the response :type page: int @@ -168353,7 +168353,7 @@ async def index_lantronix_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_lantronix_get_serialize( + _param = self._index_kubernetes_get_serialize( page=page, limit=limit, cursor=cursor, @@ -168385,7 +168385,7 @@ async def index_lantronix_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLantronixPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryK8SPaginatePagination", '404': "str", '500': "str", } @@ -168396,7 +168396,7 @@ async def index_lantronix_get_without_preload_content( return response_data.response - def _index_lantronix_get_serialize( + def _index_kubernetes_get_serialize( self, page, limit, @@ -168564,7 +168564,7 @@ def _index_lantronix_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/lantronix', + resource_path='/v3/index/kubernetes', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -168581,7 +168581,7 @@ def _index_lantronix_get_serialize( @validate_call - async def index_lenovo_get( + async def index_kunbus_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -168619,10 +168619,10 @@ async def index_lenovo_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryLenovoPaginatePagination: - """Return vulnerability data stored in index \"lenovo\" + ) -> RenderResponseWithMetadataArrayAdvisoryKunbusPaginatePagination: + """Return vulnerability data stored in index \"kunbus\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lenovo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lenovo Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lenovo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lenovo?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kunbus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KunBus Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kunbus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kunbus?cursor=` :param page: set the page number of the response :type page: int @@ -168694,7 +168694,7 @@ async def index_lenovo_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_lenovo_get_serialize( + _param = self._index_kunbus_get_serialize( page=page, limit=limit, cursor=cursor, @@ -168726,7 +168726,7 @@ async def index_lenovo_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLenovoPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryKunbusPaginatePagination", '404': "str", '500': "str", } @@ -168742,7 +168742,7 @@ async def index_lenovo_get( @validate_call - async def index_lenovo_get_with_http_info( + async def index_kunbus_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -168780,10 +168780,10 @@ async def index_lenovo_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLenovoPaginatePagination]: - """Return vulnerability data stored in index \"lenovo\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryKunbusPaginatePagination]: + """Return vulnerability data stored in index \"kunbus\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lenovo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lenovo Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lenovo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lenovo?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kunbus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KunBus Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kunbus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kunbus?cursor=` :param page: set the page number of the response :type page: int @@ -168855,7 +168855,7 @@ async def index_lenovo_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_lenovo_get_serialize( + _param = self._index_kunbus_get_serialize( page=page, limit=limit, cursor=cursor, @@ -168887,7 +168887,7 @@ async def index_lenovo_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLenovoPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryKunbusPaginatePagination", '404': "str", '500': "str", } @@ -168903,7 +168903,7 @@ async def index_lenovo_get_with_http_info( @validate_call - async def index_lenovo_get_without_preload_content( + async def index_kunbus_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -168942,9 +168942,9 @@ async def index_lenovo_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"lenovo\" + """Return vulnerability data stored in index \"kunbus\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lenovo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lenovo Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lenovo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lenovo?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kunbus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KunBus Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kunbus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kunbus?cursor=` :param page: set the page number of the response :type page: int @@ -169016,7 +169016,7 @@ async def index_lenovo_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_lenovo_get_serialize( + _param = self._index_kunbus_get_serialize( page=page, limit=limit, cursor=cursor, @@ -169048,7 +169048,7 @@ async def index_lenovo_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLenovoPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryKunbusPaginatePagination", '404': "str", '500': "str", } @@ -169059,7 +169059,7 @@ async def index_lenovo_get_without_preload_content( return response_data.response - def _index_lenovo_get_serialize( + def _index_kunbus_get_serialize( self, page, limit, @@ -169227,7 +169227,7 @@ def _index_lenovo_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/lenovo', + resource_path='/v3/index/kunbus', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -169244,7 +169244,7 @@ def _index_lenovo_get_serialize( @validate_call - async def index_lexmark_get( + async def index_lantronix_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -169282,10 +169282,10 @@ async def index_lexmark_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryLexmarkAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"lexmark\" + ) -> RenderResponseWithMetadataArrayAdvisoryLantronixPaginatePagination: + """Return vulnerability data stored in index \"lantronix\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lexmark index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lexmark Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lexmark?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lexmark?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lantronix index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lantronix Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lantronix?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lantronix?cursor=` :param page: set the page number of the response :type page: int @@ -169357,7 +169357,7 @@ async def index_lexmark_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_lexmark_get_serialize( + _param = self._index_lantronix_get_serialize( page=page, limit=limit, cursor=cursor, @@ -169389,7 +169389,7 @@ async def index_lexmark_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLexmarkAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLantronixPaginatePagination", '404': "str", '500': "str", } @@ -169405,7 +169405,7 @@ async def index_lexmark_get( @validate_call - async def index_lexmark_get_with_http_info( + async def index_lantronix_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -169443,10 +169443,10 @@ async def index_lexmark_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLexmarkAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"lexmark\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLantronixPaginatePagination]: + """Return vulnerability data stored in index \"lantronix\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lexmark index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lexmark Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lexmark?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lexmark?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lantronix index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lantronix Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lantronix?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lantronix?cursor=` :param page: set the page number of the response :type page: int @@ -169518,7 +169518,7 @@ async def index_lexmark_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_lexmark_get_serialize( + _param = self._index_lantronix_get_serialize( page=page, limit=limit, cursor=cursor, @@ -169550,7 +169550,7 @@ async def index_lexmark_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLexmarkAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLantronixPaginatePagination", '404': "str", '500': "str", } @@ -169566,7 +169566,7 @@ async def index_lexmark_get_with_http_info( @validate_call - async def index_lexmark_get_without_preload_content( + async def index_lantronix_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -169605,9 +169605,9 @@ async def index_lexmark_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"lexmark\" + """Return vulnerability data stored in index \"lantronix\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lexmark index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lexmark Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lexmark?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lexmark?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lantronix index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lantronix Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lantronix?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lantronix?cursor=` :param page: set the page number of the response :type page: int @@ -169679,7 +169679,7 @@ async def index_lexmark_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_lexmark_get_serialize( + _param = self._index_lantronix_get_serialize( page=page, limit=limit, cursor=cursor, @@ -169711,7 +169711,7 @@ async def index_lexmark_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLexmarkAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLantronixPaginatePagination", '404': "str", '500': "str", } @@ -169722,7 +169722,7 @@ async def index_lexmark_get_without_preload_content( return response_data.response - def _index_lexmark_get_serialize( + def _index_lantronix_get_serialize( self, page, limit, @@ -169890,7 +169890,7 @@ def _index_lexmark_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/lexmark', + resource_path='/v3/index/lantronix', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -169907,7 +169907,7 @@ def _index_lexmark_get_serialize( @validate_call - async def index_lg_get( + async def index_lenovo_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -169945,10 +169945,10 @@ async def index_lg_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryLGPaginatePagination: - """Return vulnerability data stored in index \"lg\" + ) -> RenderResponseWithMetadataArrayAdvisoryLenovoPaginatePagination: + """Return vulnerability data stored in index \"lenovo\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lg index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** LG Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lg?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lg?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lenovo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lenovo Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lenovo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lenovo?cursor=` :param page: set the page number of the response :type page: int @@ -170020,7 +170020,7 @@ async def index_lg_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_lg_get_serialize( + _param = self._index_lenovo_get_serialize( page=page, limit=limit, cursor=cursor, @@ -170052,7 +170052,7 @@ async def index_lg_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLGPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLenovoPaginatePagination", '404': "str", '500': "str", } @@ -170068,7 +170068,7 @@ async def index_lg_get( @validate_call - async def index_lg_get_with_http_info( + async def index_lenovo_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -170106,10 +170106,10 @@ async def index_lg_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLGPaginatePagination]: - """Return vulnerability data stored in index \"lg\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLenovoPaginatePagination]: + """Return vulnerability data stored in index \"lenovo\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lg index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** LG Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lg?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lg?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lenovo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lenovo Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lenovo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lenovo?cursor=` :param page: set the page number of the response :type page: int @@ -170181,7 +170181,7 @@ async def index_lg_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_lg_get_serialize( + _param = self._index_lenovo_get_serialize( page=page, limit=limit, cursor=cursor, @@ -170213,7 +170213,7 @@ async def index_lg_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLGPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLenovoPaginatePagination", '404': "str", '500': "str", } @@ -170229,7 +170229,7 @@ async def index_lg_get_with_http_info( @validate_call - async def index_lg_get_without_preload_content( + async def index_lenovo_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -170268,9 +170268,9 @@ async def index_lg_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"lg\" + """Return vulnerability data stored in index \"lenovo\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lg index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** LG Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lg?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lg?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lenovo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lenovo Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lenovo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lenovo?cursor=` :param page: set the page number of the response :type page: int @@ -170342,7 +170342,7 @@ async def index_lg_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_lg_get_serialize( + _param = self._index_lenovo_get_serialize( page=page, limit=limit, cursor=cursor, @@ -170374,7 +170374,7 @@ async def index_lg_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLGPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLenovoPaginatePagination", '404': "str", '500': "str", } @@ -170385,7 +170385,7 @@ async def index_lg_get_without_preload_content( return response_data.response - def _index_lg_get_serialize( + def _index_lenovo_get_serialize( self, page, limit, @@ -170553,7 +170553,7 @@ def _index_lg_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/lg', + resource_path='/v3/index/lenovo', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -170570,7 +170570,7 @@ def _index_lg_get_serialize( @validate_call - async def index_libre_office_get( + async def index_lexmark_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -170608,10 +170608,10 @@ async def index_libre_office_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryLibreOfficePaginatePagination: - """Return vulnerability data stored in index \"libre-office\" + ) -> RenderResponseWithMetadataArrayAdvisoryLexmarkAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"lexmark\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the libre-office index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Libre Office Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/libre-office?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/libre-office?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lexmark index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lexmark Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lexmark?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lexmark?cursor=` :param page: set the page number of the response :type page: int @@ -170683,7 +170683,7 @@ async def index_libre_office_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_libre_office_get_serialize( + _param = self._index_lexmark_get_serialize( page=page, limit=limit, cursor=cursor, @@ -170715,7 +170715,7 @@ async def index_libre_office_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLibreOfficePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLexmarkAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -170731,7 +170731,7 @@ async def index_libre_office_get( @validate_call - async def index_libre_office_get_with_http_info( + async def index_lexmark_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -170769,10 +170769,10 @@ async def index_libre_office_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLibreOfficePaginatePagination]: - """Return vulnerability data stored in index \"libre-office\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLexmarkAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"lexmark\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the libre-office index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Libre Office Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/libre-office?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/libre-office?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lexmark index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lexmark Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lexmark?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lexmark?cursor=` :param page: set the page number of the response :type page: int @@ -170844,7 +170844,7 @@ async def index_libre_office_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_libre_office_get_serialize( + _param = self._index_lexmark_get_serialize( page=page, limit=limit, cursor=cursor, @@ -170876,7 +170876,7 @@ async def index_libre_office_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLibreOfficePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLexmarkAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -170892,7 +170892,7 @@ async def index_libre_office_get_with_http_info( @validate_call - async def index_libre_office_get_without_preload_content( + async def index_lexmark_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -170931,9 +170931,9 @@ async def index_libre_office_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"libre-office\" + """Return vulnerability data stored in index \"lexmark\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the libre-office index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Libre Office Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/libre-office?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/libre-office?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lexmark index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lexmark Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lexmark?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lexmark?cursor=` :param page: set the page number of the response :type page: int @@ -171005,7 +171005,7 @@ async def index_libre_office_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_libre_office_get_serialize( + _param = self._index_lexmark_get_serialize( page=page, limit=limit, cursor=cursor, @@ -171037,7 +171037,7 @@ async def index_libre_office_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLibreOfficePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLexmarkAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -171048,7 +171048,7 @@ async def index_libre_office_get_without_preload_content( return response_data.response - def _index_libre_office_get_serialize( + def _index_lexmark_get_serialize( self, page, limit, @@ -171216,7 +171216,7 @@ def _index_libre_office_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/libre-office', + resource_path='/v3/index/lexmark', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -171233,7 +171233,7 @@ def _index_libre_office_get_serialize( @validate_call - async def index_linux_get( + async def index_lg_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -171271,10 +171271,10 @@ async def index_linux_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryLinuxPaginatePagination: - """Return vulnerability data stored in index \"linux\" + ) -> RenderResponseWithMetadataArrayAdvisoryLGPaginatePagination: + """Return vulnerability data stored in index \"lg\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the linux index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Linux Kernel Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/linux?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/linux?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lg index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** LG Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lg?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lg?cursor=` :param page: set the page number of the response :type page: int @@ -171346,7 +171346,7 @@ async def index_linux_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_linux_get_serialize( + _param = self._index_lg_get_serialize( page=page, limit=limit, cursor=cursor, @@ -171378,7 +171378,7 @@ async def index_linux_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLinuxPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLGPaginatePagination", '404': "str", '500': "str", } @@ -171394,7 +171394,7 @@ async def index_linux_get( @validate_call - async def index_linux_get_with_http_info( + async def index_lg_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -171432,10 +171432,10 @@ async def index_linux_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLinuxPaginatePagination]: - """Return vulnerability data stored in index \"linux\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLGPaginatePagination]: + """Return vulnerability data stored in index \"lg\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the linux index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Linux Kernel Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/linux?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/linux?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lg index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** LG Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lg?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lg?cursor=` :param page: set the page number of the response :type page: int @@ -171507,7 +171507,7 @@ async def index_linux_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_linux_get_serialize( + _param = self._index_lg_get_serialize( page=page, limit=limit, cursor=cursor, @@ -171539,7 +171539,7 @@ async def index_linux_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLinuxPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLGPaginatePagination", '404': "str", '500': "str", } @@ -171555,7 +171555,7 @@ async def index_linux_get_with_http_info( @validate_call - async def index_linux_get_without_preload_content( + async def index_lg_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -171594,9 +171594,9 @@ async def index_linux_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"linux\" + """Return vulnerability data stored in index \"lg\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the linux index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Linux Kernel Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/linux?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/linux?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lg index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** LG Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lg?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lg?cursor=` :param page: set the page number of the response :type page: int @@ -171668,7 +171668,7 @@ async def index_linux_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_linux_get_serialize( + _param = self._index_lg_get_serialize( page=page, limit=limit, cursor=cursor, @@ -171700,7 +171700,7 @@ async def index_linux_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLinuxPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLGPaginatePagination", '404': "str", '500': "str", } @@ -171711,7 +171711,7 @@ async def index_linux_get_without_preload_content( return response_data.response - def _index_linux_get_serialize( + def _index_lg_get_serialize( self, page, limit, @@ -171879,7 +171879,7 @@ def _index_linux_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/linux', + resource_path='/v3/index/lg', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -171896,7 +171896,7 @@ def _index_linux_get_serialize( @validate_call - async def index_lol_advs_get( + async def index_libre_office_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -171934,10 +171934,10 @@ async def index_lol_advs_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryLolAdvsPaginatePagination: - """Return vulnerability data stored in index \"lol-advs\" + ) -> RenderResponseWithMetadataArrayAdvisoryLibreOfficePaginatePagination: + """Return vulnerability data stored in index \"libre-office\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lol-advs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Living Off the Land Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lol-advs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lol-advs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the libre-office index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Libre Office Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/libre-office?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/libre-office?cursor=` :param page: set the page number of the response :type page: int @@ -172009,7 +172009,7 @@ async def index_lol_advs_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_lol_advs_get_serialize( + _param = self._index_libre_office_get_serialize( page=page, limit=limit, cursor=cursor, @@ -172041,7 +172041,7 @@ async def index_lol_advs_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLolAdvsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLibreOfficePaginatePagination", '404': "str", '500': "str", } @@ -172057,7 +172057,7 @@ async def index_lol_advs_get( @validate_call - async def index_lol_advs_get_with_http_info( + async def index_libre_office_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -172095,10 +172095,10 @@ async def index_lol_advs_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLolAdvsPaginatePagination]: - """Return vulnerability data stored in index \"lol-advs\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLibreOfficePaginatePagination]: + """Return vulnerability data stored in index \"libre-office\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lol-advs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Living Off the Land Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lol-advs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lol-advs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the libre-office index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Libre Office Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/libre-office?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/libre-office?cursor=` :param page: set the page number of the response :type page: int @@ -172170,7 +172170,7 @@ async def index_lol_advs_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_lol_advs_get_serialize( + _param = self._index_libre_office_get_serialize( page=page, limit=limit, cursor=cursor, @@ -172202,7 +172202,7 @@ async def index_lol_advs_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLolAdvsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLibreOfficePaginatePagination", '404': "str", '500': "str", } @@ -172218,7 +172218,7 @@ async def index_lol_advs_get_with_http_info( @validate_call - async def index_lol_advs_get_without_preload_content( + async def index_libre_office_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -172257,9 +172257,9 @@ async def index_lol_advs_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"lol-advs\" + """Return vulnerability data stored in index \"libre-office\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lol-advs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Living Off the Land Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lol-advs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lol-advs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the libre-office index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Libre Office Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/libre-office?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/libre-office?cursor=` :param page: set the page number of the response :type page: int @@ -172331,7 +172331,7 @@ async def index_lol_advs_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_lol_advs_get_serialize( + _param = self._index_libre_office_get_serialize( page=page, limit=limit, cursor=cursor, @@ -172363,7 +172363,7 @@ async def index_lol_advs_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLolAdvsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLibreOfficePaginatePagination", '404': "str", '500': "str", } @@ -172374,7 +172374,7 @@ async def index_lol_advs_get_without_preload_content( return response_data.response - def _index_lol_advs_get_serialize( + def _index_libre_office_get_serialize( self, page, limit, @@ -172542,7 +172542,7 @@ def _index_lol_advs_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/lol-advs', + resource_path='/v3/index/libre-office', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -172559,7 +172559,7 @@ def _index_lol_advs_get_serialize( @validate_call - async def index_m_files_get( + async def index_linux_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -172597,10 +172597,10 @@ async def index_m_files_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMFilesPaginatePagination: - """Return vulnerability data stored in index \"m-files\" + ) -> RenderResponseWithMetadataArrayAdvisoryLinuxPaginatePagination: + """Return vulnerability data stored in index \"linux\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the m-files index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** M-Files Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/m-files?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/m-files?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the linux index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Linux Kernel Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/linux?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/linux?cursor=` :param page: set the page number of the response :type page: int @@ -172672,7 +172672,7 @@ async def index_m_files_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_m_files_get_serialize( + _param = self._index_linux_get_serialize( page=page, limit=limit, cursor=cursor, @@ -172704,7 +172704,7 @@ async def index_m_files_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMFilesPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLinuxPaginatePagination", '404': "str", '500': "str", } @@ -172720,7 +172720,7 @@ async def index_m_files_get( @validate_call - async def index_m_files_get_with_http_info( + async def index_linux_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -172758,10 +172758,10 @@ async def index_m_files_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMFilesPaginatePagination]: - """Return vulnerability data stored in index \"m-files\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLinuxPaginatePagination]: + """Return vulnerability data stored in index \"linux\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the m-files index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** M-Files Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/m-files?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/m-files?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the linux index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Linux Kernel Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/linux?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/linux?cursor=` :param page: set the page number of the response :type page: int @@ -172833,7 +172833,7 @@ async def index_m_files_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_m_files_get_serialize( + _param = self._index_linux_get_serialize( page=page, limit=limit, cursor=cursor, @@ -172865,7 +172865,7 @@ async def index_m_files_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMFilesPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLinuxPaginatePagination", '404': "str", '500': "str", } @@ -172881,7 +172881,7 @@ async def index_m_files_get_with_http_info( @validate_call - async def index_m_files_get_without_preload_content( + async def index_linux_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -172920,9 +172920,9 @@ async def index_m_files_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"m-files\" + """Return vulnerability data stored in index \"linux\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the m-files index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** M-Files Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/m-files?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/m-files?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the linux index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Linux Kernel Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/linux?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/linux?cursor=` :param page: set the page number of the response :type page: int @@ -172994,7 +172994,7 @@ async def index_m_files_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_m_files_get_serialize( + _param = self._index_linux_get_serialize( page=page, limit=limit, cursor=cursor, @@ -173026,7 +173026,7 @@ async def index_m_files_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMFilesPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLinuxPaginatePagination", '404': "str", '500': "str", } @@ -173037,7 +173037,7 @@ async def index_m_files_get_without_preload_content( return response_data.response - def _index_m_files_get_serialize( + def _index_linux_get_serialize( self, page, limit, @@ -173205,7 +173205,7 @@ def _index_m_files_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/m-files', + resource_path='/v3/index/linux', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -173222,7 +173222,7 @@ def _index_m_files_get_serialize( @validate_call - async def index_macert_get( + async def index_lol_advs_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -173260,10 +173260,10 @@ async def index_macert_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMACertPaginatePagination: - """Return vulnerability data stored in index \"macert\" + ) -> RenderResponseWithMetadataArrayAdvisoryLolAdvsPaginatePagination: + """Return vulnerability data stored in index \"lol-advs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the macert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Moroccan CERT Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/macert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/macert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lol-advs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Living Off the Land Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lol-advs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lol-advs?cursor=` :param page: set the page number of the response :type page: int @@ -173335,7 +173335,7 @@ async def index_macert_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_macert_get_serialize( + _param = self._index_lol_advs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -173367,7 +173367,7 @@ async def index_macert_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMACertPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLolAdvsPaginatePagination", '404': "str", '500': "str", } @@ -173383,7 +173383,7 @@ async def index_macert_get( @validate_call - async def index_macert_get_with_http_info( + async def index_lol_advs_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -173421,10 +173421,10 @@ async def index_macert_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMACertPaginatePagination]: - """Return vulnerability data stored in index \"macert\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLolAdvsPaginatePagination]: + """Return vulnerability data stored in index \"lol-advs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the macert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Moroccan CERT Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/macert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/macert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lol-advs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Living Off the Land Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lol-advs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lol-advs?cursor=` :param page: set the page number of the response :type page: int @@ -173496,7 +173496,7 @@ async def index_macert_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_macert_get_serialize( + _param = self._index_lol_advs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -173528,7 +173528,7 @@ async def index_macert_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMACertPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLolAdvsPaginatePagination", '404': "str", '500': "str", } @@ -173544,7 +173544,7 @@ async def index_macert_get_with_http_info( @validate_call - async def index_macert_get_without_preload_content( + async def index_lol_advs_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -173583,9 +173583,9 @@ async def index_macert_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"macert\" + """Return vulnerability data stored in index \"lol-advs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the macert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Moroccan CERT Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/macert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/macert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lol-advs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Living Off the Land Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lol-advs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lol-advs?cursor=` :param page: set the page number of the response :type page: int @@ -173657,7 +173657,7 @@ async def index_macert_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_macert_get_serialize( + _param = self._index_lol_advs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -173689,7 +173689,7 @@ async def index_macert_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMACertPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLolAdvsPaginatePagination", '404': "str", '500': "str", } @@ -173700,7 +173700,7 @@ async def index_macert_get_without_preload_content( return response_data.response - def _index_macert_get_serialize( + def _index_lol_advs_get_serialize( self, page, limit, @@ -173868,7 +173868,7 @@ def _index_macert_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/macert', + resource_path='/v3/index/lol-advs', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -173885,7 +173885,7 @@ def _index_macert_get_serialize( @validate_call - async def index_malicious_packages_get( + async def index_m_files_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -173923,10 +173923,10 @@ async def index_malicious_packages_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMaliciousPackagePaginatePagination: - """Return vulnerability data stored in index \"malicious-packages\" + ) -> RenderResponseWithMetadataArrayAdvisoryMFilesPaginatePagination: + """Return vulnerability data stored in index \"m-files\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the malicious-packages index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Malicious Packages ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/malicious-packages?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/malicious-packages?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the m-files index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** M-Files Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/m-files?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/m-files?cursor=` :param page: set the page number of the response :type page: int @@ -173998,7 +173998,7 @@ async def index_malicious_packages_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_malicious_packages_get_serialize( + _param = self._index_m_files_get_serialize( page=page, limit=limit, cursor=cursor, @@ -174030,7 +174030,7 @@ async def index_malicious_packages_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMaliciousPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMFilesPaginatePagination", '404': "str", '500': "str", } @@ -174046,7 +174046,7 @@ async def index_malicious_packages_get( @validate_call - async def index_malicious_packages_get_with_http_info( + async def index_m_files_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -174084,10 +174084,10 @@ async def index_malicious_packages_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMaliciousPackagePaginatePagination]: - """Return vulnerability data stored in index \"malicious-packages\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMFilesPaginatePagination]: + """Return vulnerability data stored in index \"m-files\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the malicious-packages index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Malicious Packages ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/malicious-packages?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/malicious-packages?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the m-files index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** M-Files Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/m-files?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/m-files?cursor=` :param page: set the page number of the response :type page: int @@ -174159,7 +174159,7 @@ async def index_malicious_packages_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_malicious_packages_get_serialize( + _param = self._index_m_files_get_serialize( page=page, limit=limit, cursor=cursor, @@ -174191,7 +174191,7 @@ async def index_malicious_packages_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMaliciousPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMFilesPaginatePagination", '404': "str", '500': "str", } @@ -174207,7 +174207,7 @@ async def index_malicious_packages_get_with_http_info( @validate_call - async def index_malicious_packages_get_without_preload_content( + async def index_m_files_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -174246,9 +174246,9 @@ async def index_malicious_packages_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"malicious-packages\" + """Return vulnerability data stored in index \"m-files\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the malicious-packages index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Malicious Packages ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/malicious-packages?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/malicious-packages?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the m-files index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** M-Files Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/m-files?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/m-files?cursor=` :param page: set the page number of the response :type page: int @@ -174320,7 +174320,7 @@ async def index_malicious_packages_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_malicious_packages_get_serialize( + _param = self._index_m_files_get_serialize( page=page, limit=limit, cursor=cursor, @@ -174352,7 +174352,7 @@ async def index_malicious_packages_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMaliciousPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMFilesPaginatePagination", '404': "str", '500': "str", } @@ -174363,7 +174363,7 @@ async def index_malicious_packages_get_without_preload_content( return response_data.response - def _index_malicious_packages_get_serialize( + def _index_m_files_get_serialize( self, page, limit, @@ -174531,7 +174531,7 @@ def _index_malicious_packages_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/malicious-packages', + resource_path='/v3/index/m-files', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -174548,7 +174548,7 @@ def _index_malicious_packages_get_serialize( @validate_call - async def index_malicious_vscode_exts_get( + async def index_macert_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -174586,10 +174586,10 @@ async def index_malicious_vscode_exts_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMaliciousVSCodeExtsPaginatePagination: - """Return vulnerability data stored in index \"malicious-vscode-exts\" + ) -> RenderResponseWithMetadataArrayAdvisoryMACertPaginatePagination: + """Return vulnerability data stored in index \"macert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the malicious-vscode-exts index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Malicious Visual Studio Code Extensions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/malicious-vscode-exts?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/malicious-vscode-exts?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the macert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Moroccan CERT Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/macert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/macert?cursor=` :param page: set the page number of the response :type page: int @@ -174661,7 +174661,7 @@ async def index_malicious_vscode_exts_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_malicious_vscode_exts_get_serialize( + _param = self._index_macert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -174693,7 +174693,7 @@ async def index_malicious_vscode_exts_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMaliciousVSCodeExtsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMACertPaginatePagination", '404': "str", '500': "str", } @@ -174709,7 +174709,7 @@ async def index_malicious_vscode_exts_get( @validate_call - async def index_malicious_vscode_exts_get_with_http_info( + async def index_macert_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -174747,10 +174747,10 @@ async def index_malicious_vscode_exts_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMaliciousVSCodeExtsPaginatePagination]: - """Return vulnerability data stored in index \"malicious-vscode-exts\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMACertPaginatePagination]: + """Return vulnerability data stored in index \"macert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the malicious-vscode-exts index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Malicious Visual Studio Code Extensions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/malicious-vscode-exts?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/malicious-vscode-exts?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the macert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Moroccan CERT Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/macert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/macert?cursor=` :param page: set the page number of the response :type page: int @@ -174822,7 +174822,7 @@ async def index_malicious_vscode_exts_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_malicious_vscode_exts_get_serialize( + _param = self._index_macert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -174854,7 +174854,7 @@ async def index_malicious_vscode_exts_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMaliciousVSCodeExtsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMACertPaginatePagination", '404': "str", '500': "str", } @@ -174870,7 +174870,7 @@ async def index_malicious_vscode_exts_get_with_http_info( @validate_call - async def index_malicious_vscode_exts_get_without_preload_content( + async def index_macert_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -174909,9 +174909,9 @@ async def index_malicious_vscode_exts_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"malicious-vscode-exts\" + """Return vulnerability data stored in index \"macert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the malicious-vscode-exts index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Malicious Visual Studio Code Extensions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/malicious-vscode-exts?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/malicious-vscode-exts?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the macert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Moroccan CERT Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/macert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/macert?cursor=` :param page: set the page number of the response :type page: int @@ -174983,7 +174983,7 @@ async def index_malicious_vscode_exts_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_malicious_vscode_exts_get_serialize( + _param = self._index_macert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -175015,7 +175015,7 @@ async def index_malicious_vscode_exts_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMaliciousVSCodeExtsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMACertPaginatePagination", '404': "str", '500': "str", } @@ -175026,7 +175026,7 @@ async def index_malicious_vscode_exts_get_without_preload_content( return response_data.response - def _index_malicious_vscode_exts_get_serialize( + def _index_macert_get_serialize( self, page, limit, @@ -175194,7 +175194,7 @@ def _index_malicious_vscode_exts_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/malicious-vscode-exts', + resource_path='/v3/index/macert', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -175211,7 +175211,7 @@ def _index_malicious_vscode_exts_get_serialize( @validate_call - async def index_manageengine_get( + async def index_malicious_packages_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -175249,10 +175249,10 @@ async def index_manageengine_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryManageEngineAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"manageengine\" + ) -> RenderResponseWithMetadataArrayAdvisoryMaliciousPackagePaginatePagination: + """Return vulnerability data stored in index \"malicious-packages\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the manageengine index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** ManageEngine Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/manageengine?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/manageengine?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the malicious-packages index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Malicious Packages ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/malicious-packages?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/malicious-packages?cursor=` :param page: set the page number of the response :type page: int @@ -175324,7 +175324,7 @@ async def index_manageengine_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_manageengine_get_serialize( + _param = self._index_malicious_packages_get_serialize( page=page, limit=limit, cursor=cursor, @@ -175356,7 +175356,7 @@ async def index_manageengine_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryManageEngineAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMaliciousPackagePaginatePagination", '404': "str", '500': "str", } @@ -175372,7 +175372,7 @@ async def index_manageengine_get( @validate_call - async def index_manageengine_get_with_http_info( + async def index_malicious_packages_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -175410,10 +175410,10 @@ async def index_manageengine_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryManageEngineAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"manageengine\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMaliciousPackagePaginatePagination]: + """Return vulnerability data stored in index \"malicious-packages\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the manageengine index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** ManageEngine Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/manageengine?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/manageengine?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the malicious-packages index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Malicious Packages ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/malicious-packages?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/malicious-packages?cursor=` :param page: set the page number of the response :type page: int @@ -175485,7 +175485,7 @@ async def index_manageengine_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_manageengine_get_serialize( + _param = self._index_malicious_packages_get_serialize( page=page, limit=limit, cursor=cursor, @@ -175517,7 +175517,7 @@ async def index_manageengine_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryManageEngineAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMaliciousPackagePaginatePagination", '404': "str", '500': "str", } @@ -175533,7 +175533,7 @@ async def index_manageengine_get_with_http_info( @validate_call - async def index_manageengine_get_without_preload_content( + async def index_malicious_packages_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -175572,9 +175572,9 @@ async def index_manageengine_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"manageengine\" + """Return vulnerability data stored in index \"malicious-packages\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the manageengine index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** ManageEngine Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/manageengine?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/manageengine?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the malicious-packages index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Malicious Packages ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/malicious-packages?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/malicious-packages?cursor=` :param page: set the page number of the response :type page: int @@ -175646,7 +175646,7 @@ async def index_manageengine_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_manageengine_get_serialize( + _param = self._index_malicious_packages_get_serialize( page=page, limit=limit, cursor=cursor, @@ -175678,7 +175678,7 @@ async def index_manageengine_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryManageEngineAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMaliciousPackagePaginatePagination", '404': "str", '500': "str", } @@ -175689,7 +175689,7 @@ async def index_manageengine_get_without_preload_content( return response_data.response - def _index_manageengine_get_serialize( + def _index_malicious_packages_get_serialize( self, page, limit, @@ -175857,7 +175857,7 @@ def _index_manageengine_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/manageengine', + resource_path='/v3/index/malicious-packages', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -175874,7 +175874,7 @@ def _index_manageengine_get_serialize( @validate_call - async def index_maven_get( + async def index_malicious_vscode_exts_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -175912,10 +175912,10 @@ async def index_maven_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: - """Return vulnerability data stored in index \"maven\" + ) -> RenderResponseWithMetadataArrayAdvisoryMaliciousVSCodeExtsPaginatePagination: + """Return vulnerability data stored in index \"malicious-vscode-exts\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the maven index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Maven (Java) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/maven?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/maven?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the malicious-vscode-exts index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Malicious Visual Studio Code Extensions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/malicious-vscode-exts?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/malicious-vscode-exts?cursor=` :param page: set the page number of the response :type page: int @@ -175987,7 +175987,7 @@ async def index_maven_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_maven_get_serialize( + _param = self._index_malicious_vscode_exts_get_serialize( page=page, limit=limit, cursor=cursor, @@ -176019,7 +176019,7 @@ async def index_maven_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMaliciousVSCodeExtsPaginatePagination", '404': "str", '500': "str", } @@ -176035,7 +176035,7 @@ async def index_maven_get( @validate_call - async def index_maven_get_with_http_info( + async def index_malicious_vscode_exts_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -176073,10 +176073,10 @@ async def index_maven_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: - """Return vulnerability data stored in index \"maven\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMaliciousVSCodeExtsPaginatePagination]: + """Return vulnerability data stored in index \"malicious-vscode-exts\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the maven index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Maven (Java) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/maven?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/maven?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the malicious-vscode-exts index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Malicious Visual Studio Code Extensions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/malicious-vscode-exts?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/malicious-vscode-exts?cursor=` :param page: set the page number of the response :type page: int @@ -176148,7 +176148,7 @@ async def index_maven_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_maven_get_serialize( + _param = self._index_malicious_vscode_exts_get_serialize( page=page, limit=limit, cursor=cursor, @@ -176180,7 +176180,7 @@ async def index_maven_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMaliciousVSCodeExtsPaginatePagination", '404': "str", '500': "str", } @@ -176196,7 +176196,7 @@ async def index_maven_get_with_http_info( @validate_call - async def index_maven_get_without_preload_content( + async def index_malicious_vscode_exts_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -176235,9 +176235,9 @@ async def index_maven_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"maven\" + """Return vulnerability data stored in index \"malicious-vscode-exts\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the maven index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Maven (Java) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/maven?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/maven?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the malicious-vscode-exts index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Malicious Visual Studio Code Extensions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/malicious-vscode-exts?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/malicious-vscode-exts?cursor=` :param page: set the page number of the response :type page: int @@ -176309,7 +176309,7 @@ async def index_maven_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_maven_get_serialize( + _param = self._index_malicious_vscode_exts_get_serialize( page=page, limit=limit, cursor=cursor, @@ -176341,7 +176341,7 @@ async def index_maven_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMaliciousVSCodeExtsPaginatePagination", '404': "str", '500': "str", } @@ -176352,7 +176352,7 @@ async def index_maven_get_without_preload_content( return response_data.response - def _index_maven_get_serialize( + def _index_malicious_vscode_exts_get_serialize( self, page, limit, @@ -176520,7 +176520,7 @@ def _index_maven_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/maven', + resource_path='/v3/index/malicious-vscode-exts', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -176537,7 +176537,7 @@ def _index_maven_get_serialize( @validate_call - async def index_mbed_tls_get( + async def index_manageengine_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -176575,10 +176575,10 @@ async def index_mbed_tls_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMbedTLSPaginatePagination: - """Return vulnerability data stored in index \"mbed-tls\" + ) -> RenderResponseWithMetadataArrayAdvisoryManageEngineAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"manageengine\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mbed-tls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mbed TLS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mbed-tls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mbed-tls?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the manageengine index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** ManageEngine Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/manageengine?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/manageengine?cursor=` :param page: set the page number of the response :type page: int @@ -176650,7 +176650,7 @@ async def index_mbed_tls_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mbed_tls_get_serialize( + _param = self._index_manageengine_get_serialize( page=page, limit=limit, cursor=cursor, @@ -176682,7 +176682,7 @@ async def index_mbed_tls_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMbedTLSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryManageEngineAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -176698,7 +176698,7 @@ async def index_mbed_tls_get( @validate_call - async def index_mbed_tls_get_with_http_info( + async def index_manageengine_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -176736,10 +176736,10 @@ async def index_mbed_tls_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMbedTLSPaginatePagination]: - """Return vulnerability data stored in index \"mbed-tls\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryManageEngineAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"manageengine\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mbed-tls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mbed TLS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mbed-tls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mbed-tls?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the manageengine index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** ManageEngine Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/manageengine?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/manageengine?cursor=` :param page: set the page number of the response :type page: int @@ -176811,7 +176811,7 @@ async def index_mbed_tls_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mbed_tls_get_serialize( + _param = self._index_manageengine_get_serialize( page=page, limit=limit, cursor=cursor, @@ -176843,7 +176843,7 @@ async def index_mbed_tls_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMbedTLSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryManageEngineAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -176859,7 +176859,7 @@ async def index_mbed_tls_get_with_http_info( @validate_call - async def index_mbed_tls_get_without_preload_content( + async def index_manageengine_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -176898,9 +176898,9 @@ async def index_mbed_tls_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"mbed-tls\" + """Return vulnerability data stored in index \"manageengine\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mbed-tls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mbed TLS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mbed-tls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mbed-tls?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the manageengine index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** ManageEngine Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/manageengine?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/manageengine?cursor=` :param page: set the page number of the response :type page: int @@ -176972,7 +176972,7 @@ async def index_mbed_tls_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mbed_tls_get_serialize( + _param = self._index_manageengine_get_serialize( page=page, limit=limit, cursor=cursor, @@ -177004,7 +177004,7 @@ async def index_mbed_tls_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMbedTLSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryManageEngineAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -177015,7 +177015,7 @@ async def index_mbed_tls_get_without_preload_content( return response_data.response - def _index_mbed_tls_get_serialize( + def _index_manageengine_get_serialize( self, page, limit, @@ -177183,7 +177183,7 @@ def _index_mbed_tls_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/mbed-tls', + resource_path='/v3/index/manageengine', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -177200,7 +177200,7 @@ def _index_mbed_tls_get_serialize( @validate_call - async def index_mcafee_get( + async def index_maven_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -177238,10 +177238,10 @@ async def index_mcafee_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMcAfeePaginatePagination: - """Return vulnerability data stored in index \"mcafee\" + ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: + """Return vulnerability data stored in index \"maven\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mcafee index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** McAfee Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mcafee?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mcafee?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the maven index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Maven (Java) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/maven?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/maven?cursor=` :param page: set the page number of the response :type page: int @@ -177313,7 +177313,7 @@ async def index_mcafee_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mcafee_get_serialize( + _param = self._index_maven_get_serialize( page=page, limit=limit, cursor=cursor, @@ -177345,7 +177345,7 @@ async def index_mcafee_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMcAfeePaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -177361,7 +177361,7 @@ async def index_mcafee_get( @validate_call - async def index_mcafee_get_with_http_info( + async def index_maven_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -177399,10 +177399,10 @@ async def index_mcafee_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMcAfeePaginatePagination]: - """Return vulnerability data stored in index \"mcafee\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: + """Return vulnerability data stored in index \"maven\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mcafee index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** McAfee Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mcafee?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mcafee?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the maven index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Maven (Java) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/maven?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/maven?cursor=` :param page: set the page number of the response :type page: int @@ -177474,7 +177474,7 @@ async def index_mcafee_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mcafee_get_serialize( + _param = self._index_maven_get_serialize( page=page, limit=limit, cursor=cursor, @@ -177506,7 +177506,7 @@ async def index_mcafee_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMcAfeePaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -177522,7 +177522,7 @@ async def index_mcafee_get_with_http_info( @validate_call - async def index_mcafee_get_without_preload_content( + async def index_maven_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -177561,9 +177561,9 @@ async def index_mcafee_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"mcafee\" + """Return vulnerability data stored in index \"maven\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mcafee index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** McAfee Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mcafee?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mcafee?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the maven index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Maven (Java) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/maven?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/maven?cursor=` :param page: set the page number of the response :type page: int @@ -177635,7 +177635,7 @@ async def index_mcafee_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mcafee_get_serialize( + _param = self._index_maven_get_serialize( page=page, limit=limit, cursor=cursor, @@ -177667,7 +177667,7 @@ async def index_mcafee_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMcAfeePaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -177678,7 +177678,7 @@ async def index_mcafee_get_without_preload_content( return response_data.response - def _index_mcafee_get_serialize( + def _index_maven_get_serialize( self, page, limit, @@ -177846,7 +177846,7 @@ def _index_mcafee_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/mcafee', + resource_path='/v3/index/maven', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -177863,7 +177863,7 @@ def _index_mcafee_get_serialize( @validate_call - async def index_mediatek_get( + async def index_mbed_tls_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -177901,10 +177901,10 @@ async def index_mediatek_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMediatekPaginatePagination: - """Return vulnerability data stored in index \"mediatek\" + ) -> RenderResponseWithMetadataArrayAdvisoryMbedTLSPaginatePagination: + """Return vulnerability data stored in index \"mbed-tls\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mediatek index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MediaTek Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mediatek?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mediatek?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mbed-tls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mbed TLS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mbed-tls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mbed-tls?cursor=` :param page: set the page number of the response :type page: int @@ -177976,7 +177976,7 @@ async def index_mediatek_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mediatek_get_serialize( + _param = self._index_mbed_tls_get_serialize( page=page, limit=limit, cursor=cursor, @@ -178008,7 +178008,7 @@ async def index_mediatek_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMediatekPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMbedTLSPaginatePagination", '404': "str", '500': "str", } @@ -178024,7 +178024,7 @@ async def index_mediatek_get( @validate_call - async def index_mediatek_get_with_http_info( + async def index_mbed_tls_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -178062,10 +178062,10 @@ async def index_mediatek_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMediatekPaginatePagination]: - """Return vulnerability data stored in index \"mediatek\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMbedTLSPaginatePagination]: + """Return vulnerability data stored in index \"mbed-tls\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mediatek index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MediaTek Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mediatek?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mediatek?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mbed-tls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mbed TLS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mbed-tls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mbed-tls?cursor=` :param page: set the page number of the response :type page: int @@ -178137,7 +178137,7 @@ async def index_mediatek_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mediatek_get_serialize( + _param = self._index_mbed_tls_get_serialize( page=page, limit=limit, cursor=cursor, @@ -178169,7 +178169,7 @@ async def index_mediatek_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMediatekPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMbedTLSPaginatePagination", '404': "str", '500': "str", } @@ -178185,7 +178185,7 @@ async def index_mediatek_get_with_http_info( @validate_call - async def index_mediatek_get_without_preload_content( + async def index_mbed_tls_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -178224,9 +178224,9 @@ async def index_mediatek_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"mediatek\" + """Return vulnerability data stored in index \"mbed-tls\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mediatek index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MediaTek Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mediatek?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mediatek?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mbed-tls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mbed TLS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mbed-tls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mbed-tls?cursor=` :param page: set the page number of the response :type page: int @@ -178298,7 +178298,7 @@ async def index_mediatek_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mediatek_get_serialize( + _param = self._index_mbed_tls_get_serialize( page=page, limit=limit, cursor=cursor, @@ -178330,7 +178330,7 @@ async def index_mediatek_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMediatekPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMbedTLSPaginatePagination", '404': "str", '500': "str", } @@ -178341,7 +178341,7 @@ async def index_mediatek_get_without_preload_content( return response_data.response - def _index_mediatek_get_serialize( + def _index_mbed_tls_get_serialize( self, page, limit, @@ -178509,7 +178509,7 @@ def _index_mediatek_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/mediatek', + resource_path='/v3/index/mbed-tls', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -178526,7 +178526,7 @@ def _index_mediatek_get_serialize( @validate_call - async def index_medtronic_get( + async def index_mcafee_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -178564,10 +178564,10 @@ async def index_medtronic_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMedtronicAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"medtronic\" + ) -> RenderResponseWithMetadataArrayAdvisoryMcAfeePaginatePagination: + """Return vulnerability data stored in index \"mcafee\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the medtronic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Medtronic Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/medtronic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/medtronic?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mcafee index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** McAfee Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mcafee?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mcafee?cursor=` :param page: set the page number of the response :type page: int @@ -178639,7 +178639,7 @@ async def index_medtronic_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_medtronic_get_serialize( + _param = self._index_mcafee_get_serialize( page=page, limit=limit, cursor=cursor, @@ -178671,7 +178671,7 @@ async def index_medtronic_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMedtronicAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMcAfeePaginatePagination", '404': "str", '500': "str", } @@ -178687,7 +178687,7 @@ async def index_medtronic_get( @validate_call - async def index_medtronic_get_with_http_info( + async def index_mcafee_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -178725,10 +178725,10 @@ async def index_medtronic_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMedtronicAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"medtronic\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMcAfeePaginatePagination]: + """Return vulnerability data stored in index \"mcafee\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the medtronic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Medtronic Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/medtronic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/medtronic?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mcafee index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** McAfee Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mcafee?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mcafee?cursor=` :param page: set the page number of the response :type page: int @@ -178800,7 +178800,7 @@ async def index_medtronic_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_medtronic_get_serialize( + _param = self._index_mcafee_get_serialize( page=page, limit=limit, cursor=cursor, @@ -178832,7 +178832,7 @@ async def index_medtronic_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMedtronicAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMcAfeePaginatePagination", '404': "str", '500': "str", } @@ -178848,7 +178848,7 @@ async def index_medtronic_get_with_http_info( @validate_call - async def index_medtronic_get_without_preload_content( + async def index_mcafee_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -178887,9 +178887,9 @@ async def index_medtronic_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"medtronic\" + """Return vulnerability data stored in index \"mcafee\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the medtronic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Medtronic Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/medtronic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/medtronic?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mcafee index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** McAfee Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mcafee?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mcafee?cursor=` :param page: set the page number of the response :type page: int @@ -178961,7 +178961,7 @@ async def index_medtronic_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_medtronic_get_serialize( + _param = self._index_mcafee_get_serialize( page=page, limit=limit, cursor=cursor, @@ -178993,7 +178993,7 @@ async def index_medtronic_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMedtronicAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMcAfeePaginatePagination", '404': "str", '500': "str", } @@ -179004,7 +179004,7 @@ async def index_medtronic_get_without_preload_content( return response_data.response - def _index_medtronic_get_serialize( + def _index_mcafee_get_serialize( self, page, limit, @@ -179172,7 +179172,7 @@ def _index_medtronic_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/medtronic', + resource_path='/v3/index/mcafee', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -179189,7 +179189,7 @@ def _index_medtronic_get_serialize( @validate_call - async def index_mendix_get( + async def index_mediatek_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -179227,10 +179227,10 @@ async def index_mendix_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMendixPaginatePagination: - """Return vulnerability data stored in index \"mendix\" + ) -> RenderResponseWithMetadataArrayAdvisoryMediatekPaginatePagination: + """Return vulnerability data stored in index \"mediatek\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mendix index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mendix Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mendix?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mendix?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mediatek index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MediaTek Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mediatek?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mediatek?cursor=` :param page: set the page number of the response :type page: int @@ -179302,7 +179302,7 @@ async def index_mendix_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mendix_get_serialize( + _param = self._index_mediatek_get_serialize( page=page, limit=limit, cursor=cursor, @@ -179334,7 +179334,7 @@ async def index_mendix_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMendixPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMediatekPaginatePagination", '404': "str", '500': "str", } @@ -179350,7 +179350,7 @@ async def index_mendix_get( @validate_call - async def index_mendix_get_with_http_info( + async def index_mediatek_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -179388,10 +179388,10 @@ async def index_mendix_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMendixPaginatePagination]: - """Return vulnerability data stored in index \"mendix\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMediatekPaginatePagination]: + """Return vulnerability data stored in index \"mediatek\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mendix index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mendix Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mendix?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mendix?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mediatek index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MediaTek Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mediatek?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mediatek?cursor=` :param page: set the page number of the response :type page: int @@ -179463,7 +179463,7 @@ async def index_mendix_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mendix_get_serialize( + _param = self._index_mediatek_get_serialize( page=page, limit=limit, cursor=cursor, @@ -179495,7 +179495,7 @@ async def index_mendix_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMendixPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMediatekPaginatePagination", '404': "str", '500': "str", } @@ -179511,7 +179511,7 @@ async def index_mendix_get_with_http_info( @validate_call - async def index_mendix_get_without_preload_content( + async def index_mediatek_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -179550,9 +179550,9 @@ async def index_mendix_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"mendix\" + """Return vulnerability data stored in index \"mediatek\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mendix index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mendix Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mendix?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mendix?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mediatek index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MediaTek Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mediatek?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mediatek?cursor=` :param page: set the page number of the response :type page: int @@ -179624,7 +179624,7 @@ async def index_mendix_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mendix_get_serialize( + _param = self._index_mediatek_get_serialize( page=page, limit=limit, cursor=cursor, @@ -179656,7 +179656,7 @@ async def index_mendix_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMendixPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMediatekPaginatePagination", '404': "str", '500': "str", } @@ -179667,7 +179667,7 @@ async def index_mendix_get_without_preload_content( return response_data.response - def _index_mendix_get_serialize( + def _index_mediatek_get_serialize( self, page, limit, @@ -179835,7 +179835,7 @@ def _index_mendix_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/mendix', + resource_path='/v3/index/mediatek', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -179852,7 +179852,7 @@ def _index_mendix_get_serialize( @validate_call - async def index_meta_advisories_get( + async def index_medtronic_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -179890,10 +179890,10 @@ async def index_meta_advisories_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMetaAdvisoriesPaginatePagination: - """Return vulnerability data stored in index \"meta-advisories\" + ) -> RenderResponseWithMetadataArrayAdvisoryMedtronicAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"medtronic\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the meta-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Meta Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/meta-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/meta-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the medtronic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Medtronic Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/medtronic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/medtronic?cursor=` :param page: set the page number of the response :type page: int @@ -179965,7 +179965,7 @@ async def index_meta_advisories_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_meta_advisories_get_serialize( + _param = self._index_medtronic_get_serialize( page=page, limit=limit, cursor=cursor, @@ -179997,7 +179997,7 @@ async def index_meta_advisories_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMetaAdvisoriesPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMedtronicAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -180013,7 +180013,7 @@ async def index_meta_advisories_get( @validate_call - async def index_meta_advisories_get_with_http_info( + async def index_medtronic_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -180051,10 +180051,10 @@ async def index_meta_advisories_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMetaAdvisoriesPaginatePagination]: - """Return vulnerability data stored in index \"meta-advisories\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMedtronicAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"medtronic\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the meta-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Meta Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/meta-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/meta-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the medtronic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Medtronic Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/medtronic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/medtronic?cursor=` :param page: set the page number of the response :type page: int @@ -180126,7 +180126,7 @@ async def index_meta_advisories_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_meta_advisories_get_serialize( + _param = self._index_medtronic_get_serialize( page=page, limit=limit, cursor=cursor, @@ -180158,7 +180158,7 @@ async def index_meta_advisories_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMetaAdvisoriesPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMedtronicAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -180174,7 +180174,7 @@ async def index_meta_advisories_get_with_http_info( @validate_call - async def index_meta_advisories_get_without_preload_content( + async def index_medtronic_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -180213,9 +180213,9 @@ async def index_meta_advisories_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"meta-advisories\" + """Return vulnerability data stored in index \"medtronic\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the meta-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Meta Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/meta-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/meta-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the medtronic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Medtronic Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/medtronic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/medtronic?cursor=` :param page: set the page number of the response :type page: int @@ -180287,7 +180287,7 @@ async def index_meta_advisories_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_meta_advisories_get_serialize( + _param = self._index_medtronic_get_serialize( page=page, limit=limit, cursor=cursor, @@ -180319,7 +180319,7 @@ async def index_meta_advisories_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMetaAdvisoriesPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMedtronicAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -180330,7 +180330,7 @@ async def index_meta_advisories_get_without_preload_content( return response_data.response - def _index_meta_advisories_get_serialize( + def _index_medtronic_get_serialize( self, page, limit, @@ -180498,7 +180498,7 @@ def _index_meta_advisories_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/meta-advisories', + resource_path='/v3/index/medtronic', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -180515,7 +180515,7 @@ def _index_meta_advisories_get_serialize( @validate_call - async def index_metasploit_get( + async def index_mendix_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -180553,10 +180553,10 @@ async def index_metasploit_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMetasploitExploitPaginatePagination: - """Return vulnerability data stored in index \"metasploit\" + ) -> RenderResponseWithMetadataArrayAdvisoryMendixPaginatePagination: + """Return vulnerability data stored in index \"mendix\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the metasploit index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Metasploit Modules ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/metasploit?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/metasploit?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mendix index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mendix Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mendix?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mendix?cursor=` :param page: set the page number of the response :type page: int @@ -180628,7 +180628,7 @@ async def index_metasploit_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_metasploit_get_serialize( + _param = self._index_mendix_get_serialize( page=page, limit=limit, cursor=cursor, @@ -180660,7 +180660,7 @@ async def index_metasploit_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMetasploitExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMendixPaginatePagination", '404': "str", '500': "str", } @@ -180676,7 +180676,7 @@ async def index_metasploit_get( @validate_call - async def index_metasploit_get_with_http_info( + async def index_mendix_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -180714,10 +180714,10 @@ async def index_metasploit_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMetasploitExploitPaginatePagination]: - """Return vulnerability data stored in index \"metasploit\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMendixPaginatePagination]: + """Return vulnerability data stored in index \"mendix\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the metasploit index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Metasploit Modules ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/metasploit?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/metasploit?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mendix index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mendix Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mendix?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mendix?cursor=` :param page: set the page number of the response :type page: int @@ -180789,7 +180789,7 @@ async def index_metasploit_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_metasploit_get_serialize( + _param = self._index_mendix_get_serialize( page=page, limit=limit, cursor=cursor, @@ -180821,7 +180821,7 @@ async def index_metasploit_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMetasploitExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMendixPaginatePagination", '404': "str", '500': "str", } @@ -180837,7 +180837,7 @@ async def index_metasploit_get_with_http_info( @validate_call - async def index_metasploit_get_without_preload_content( + async def index_mendix_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -180876,9 +180876,9 @@ async def index_metasploit_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"metasploit\" + """Return vulnerability data stored in index \"mendix\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the metasploit index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Metasploit Modules ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/metasploit?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/metasploit?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mendix index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mendix Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mendix?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mendix?cursor=` :param page: set the page number of the response :type page: int @@ -180950,7 +180950,7 @@ async def index_metasploit_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_metasploit_get_serialize( + _param = self._index_mendix_get_serialize( page=page, limit=limit, cursor=cursor, @@ -180982,7 +180982,7 @@ async def index_metasploit_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMetasploitExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMendixPaginatePagination", '404': "str", '500': "str", } @@ -180993,7 +180993,7 @@ async def index_metasploit_get_without_preload_content( return response_data.response - def _index_metasploit_get_serialize( + def _index_mendix_get_serialize( self, page, limit, @@ -181161,7 +181161,7 @@ def _index_metasploit_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/metasploit', + resource_path='/v3/index/mendix', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -181178,7 +181178,7 @@ def _index_metasploit_get_serialize( @validate_call - async def index_microsoft_csaf_get( + async def index_meta_advisories_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -181216,10 +181216,10 @@ async def index_microsoft_csaf_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMicrosoftCSAFPaginatePagination: - """Return vulnerability data stored in index \"microsoft-csaf\" + ) -> RenderResponseWithMetadataArrayAdvisoryMetaAdvisoriesPaginatePagination: + """Return vulnerability data stored in index \"meta-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-csaf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft CSAF ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-csaf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-csaf?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the meta-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Meta Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/meta-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/meta-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -181291,7 +181291,7 @@ async def index_microsoft_csaf_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_microsoft_csaf_get_serialize( + _param = self._index_meta_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -181323,7 +181323,7 @@ async def index_microsoft_csaf_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftCSAFPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMetaAdvisoriesPaginatePagination", '404': "str", '500': "str", } @@ -181339,7 +181339,7 @@ async def index_microsoft_csaf_get( @validate_call - async def index_microsoft_csaf_get_with_http_info( + async def index_meta_advisories_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -181377,10 +181377,10 @@ async def index_microsoft_csaf_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMicrosoftCSAFPaginatePagination]: - """Return vulnerability data stored in index \"microsoft-csaf\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMetaAdvisoriesPaginatePagination]: + """Return vulnerability data stored in index \"meta-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-csaf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft CSAF ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-csaf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-csaf?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the meta-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Meta Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/meta-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/meta-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -181452,7 +181452,7 @@ async def index_microsoft_csaf_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_microsoft_csaf_get_serialize( + _param = self._index_meta_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -181484,7 +181484,7 @@ async def index_microsoft_csaf_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftCSAFPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMetaAdvisoriesPaginatePagination", '404': "str", '500': "str", } @@ -181500,7 +181500,7 @@ async def index_microsoft_csaf_get_with_http_info( @validate_call - async def index_microsoft_csaf_get_without_preload_content( + async def index_meta_advisories_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -181539,9 +181539,9 @@ async def index_microsoft_csaf_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"microsoft-csaf\" + """Return vulnerability data stored in index \"meta-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-csaf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft CSAF ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-csaf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-csaf?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the meta-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Meta Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/meta-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/meta-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -181613,7 +181613,7 @@ async def index_microsoft_csaf_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_microsoft_csaf_get_serialize( + _param = self._index_meta_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -181645,7 +181645,7 @@ async def index_microsoft_csaf_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftCSAFPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMetaAdvisoriesPaginatePagination", '404': "str", '500': "str", } @@ -181656,7 +181656,7 @@ async def index_microsoft_csaf_get_without_preload_content( return response_data.response - def _index_microsoft_csaf_get_serialize( + def _index_meta_advisories_get_serialize( self, page, limit, @@ -181824,7 +181824,7 @@ def _index_microsoft_csaf_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/microsoft-csaf', + resource_path='/v3/index/meta-advisories', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -181841,7 +181841,7 @@ def _index_microsoft_csaf_get_serialize( @validate_call - async def index_microsoft_cvrf_get( + async def index_metasploit_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -181879,10 +181879,10 @@ async def index_microsoft_cvrf_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMicrosoftCVRFPaginatePagination: - """Return vulnerability data stored in index \"microsoft-cvrf\" + ) -> RenderResponseWithMetadataArrayAdvisoryMetasploitExploitPaginatePagination: + """Return vulnerability data stored in index \"metasploit\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-cvrf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-cvrf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-cvrf?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the metasploit index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Metasploit Modules ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/metasploit?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/metasploit?cursor=` :param page: set the page number of the response :type page: int @@ -181954,7 +181954,7 @@ async def index_microsoft_cvrf_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_microsoft_cvrf_get_serialize( + _param = self._index_metasploit_get_serialize( page=page, limit=limit, cursor=cursor, @@ -181986,7 +181986,7 @@ async def index_microsoft_cvrf_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftCVRFPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMetasploitExploitPaginatePagination", '404': "str", '500': "str", } @@ -182002,7 +182002,7 @@ async def index_microsoft_cvrf_get( @validate_call - async def index_microsoft_cvrf_get_with_http_info( + async def index_metasploit_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -182040,10 +182040,10 @@ async def index_microsoft_cvrf_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMicrosoftCVRFPaginatePagination]: - """Return vulnerability data stored in index \"microsoft-cvrf\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMetasploitExploitPaginatePagination]: + """Return vulnerability data stored in index \"metasploit\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-cvrf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-cvrf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-cvrf?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the metasploit index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Metasploit Modules ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/metasploit?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/metasploit?cursor=` :param page: set the page number of the response :type page: int @@ -182115,7 +182115,7 @@ async def index_microsoft_cvrf_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_microsoft_cvrf_get_serialize( + _param = self._index_metasploit_get_serialize( page=page, limit=limit, cursor=cursor, @@ -182147,7 +182147,7 @@ async def index_microsoft_cvrf_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftCVRFPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMetasploitExploitPaginatePagination", '404': "str", '500': "str", } @@ -182163,7 +182163,7 @@ async def index_microsoft_cvrf_get_with_http_info( @validate_call - async def index_microsoft_cvrf_get_without_preload_content( + async def index_metasploit_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -182202,9 +182202,9 @@ async def index_microsoft_cvrf_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"microsoft-cvrf\" + """Return vulnerability data stored in index \"metasploit\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-cvrf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-cvrf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-cvrf?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the metasploit index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Metasploit Modules ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/metasploit?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/metasploit?cursor=` :param page: set the page number of the response :type page: int @@ -182276,7 +182276,7 @@ async def index_microsoft_cvrf_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_microsoft_cvrf_get_serialize( + _param = self._index_metasploit_get_serialize( page=page, limit=limit, cursor=cursor, @@ -182308,7 +182308,7 @@ async def index_microsoft_cvrf_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftCVRFPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMetasploitExploitPaginatePagination", '404': "str", '500': "str", } @@ -182319,7 +182319,7 @@ async def index_microsoft_cvrf_get_without_preload_content( return response_data.response - def _index_microsoft_cvrf_get_serialize( + def _index_metasploit_get_serialize( self, page, limit, @@ -182487,7 +182487,7 @@ def _index_microsoft_cvrf_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/microsoft-cvrf', + resource_path='/v3/index/metasploit', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -182504,7 +182504,7 @@ def _index_microsoft_cvrf_get_serialize( @validate_call - async def index_microsoft_driver_block_list_get( + async def index_microsoft_csaf_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -182542,10 +182542,10 @@ async def index_microsoft_driver_block_list_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMicrosoftDriverBlockListPaginatePagination: - """Return vulnerability data stored in index \"microsoft-driver-block-list\" + ) -> RenderResponseWithMetadataArrayAdvisoryMicrosoftCSAFPaginatePagination: + """Return vulnerability data stored in index \"microsoft-csaf\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-driver-block-list index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft's Vulnerable Drivers Blocklist ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-driver-block-list?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-driver-block-list?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-csaf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft CSAF ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-csaf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-csaf?cursor=` :param page: set the page number of the response :type page: int @@ -182617,7 +182617,7 @@ async def index_microsoft_driver_block_list_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_microsoft_driver_block_list_get_serialize( + _param = self._index_microsoft_csaf_get_serialize( page=page, limit=limit, cursor=cursor, @@ -182649,7 +182649,7 @@ async def index_microsoft_driver_block_list_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftDriverBlockListPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftCSAFPaginatePagination", '404': "str", '500': "str", } @@ -182665,7 +182665,7 @@ async def index_microsoft_driver_block_list_get( @validate_call - async def index_microsoft_driver_block_list_get_with_http_info( + async def index_microsoft_csaf_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -182703,10 +182703,10 @@ async def index_microsoft_driver_block_list_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMicrosoftDriverBlockListPaginatePagination]: - """Return vulnerability data stored in index \"microsoft-driver-block-list\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMicrosoftCSAFPaginatePagination]: + """Return vulnerability data stored in index \"microsoft-csaf\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-driver-block-list index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft's Vulnerable Drivers Blocklist ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-driver-block-list?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-driver-block-list?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-csaf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft CSAF ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-csaf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-csaf?cursor=` :param page: set the page number of the response :type page: int @@ -182778,7 +182778,7 @@ async def index_microsoft_driver_block_list_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_microsoft_driver_block_list_get_serialize( + _param = self._index_microsoft_csaf_get_serialize( page=page, limit=limit, cursor=cursor, @@ -182810,7 +182810,7 @@ async def index_microsoft_driver_block_list_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftDriverBlockListPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftCSAFPaginatePagination", '404': "str", '500': "str", } @@ -182826,7 +182826,7 @@ async def index_microsoft_driver_block_list_get_with_http_info( @validate_call - async def index_microsoft_driver_block_list_get_without_preload_content( + async def index_microsoft_csaf_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -182865,9 +182865,9 @@ async def index_microsoft_driver_block_list_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"microsoft-driver-block-list\" + """Return vulnerability data stored in index \"microsoft-csaf\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-driver-block-list index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft's Vulnerable Drivers Blocklist ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-driver-block-list?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-driver-block-list?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-csaf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft CSAF ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-csaf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-csaf?cursor=` :param page: set the page number of the response :type page: int @@ -182939,7 +182939,7 @@ async def index_microsoft_driver_block_list_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_microsoft_driver_block_list_get_serialize( + _param = self._index_microsoft_csaf_get_serialize( page=page, limit=limit, cursor=cursor, @@ -182971,7 +182971,7 @@ async def index_microsoft_driver_block_list_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftDriverBlockListPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftCSAFPaginatePagination", '404': "str", '500': "str", } @@ -182982,7 +182982,7 @@ async def index_microsoft_driver_block_list_get_without_preload_content( return response_data.response - def _index_microsoft_driver_block_list_get_serialize( + def _index_microsoft_csaf_get_serialize( self, page, limit, @@ -183150,7 +183150,7 @@ def _index_microsoft_driver_block_list_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/microsoft-driver-block-list', + resource_path='/v3/index/microsoft-csaf', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -183167,7 +183167,7 @@ def _index_microsoft_driver_block_list_get_serialize( @validate_call - async def index_microsoft_kb_get( + async def index_microsoft_cvrf_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -183205,10 +183205,10 @@ async def index_microsoft_kb_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMicrosoftKbPaginatePagination: - """Return vulnerability data stored in index \"microsoft-kb\" + ) -> RenderResponseWithMetadataArrayAdvisoryMicrosoftCVRFPaginatePagination: + """Return vulnerability data stored in index \"microsoft-cvrf\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-kb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft KB list by CVE ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-kb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-kb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-cvrf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-cvrf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-cvrf?cursor=` :param page: set the page number of the response :type page: int @@ -183280,7 +183280,7 @@ async def index_microsoft_kb_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_microsoft_kb_get_serialize( + _param = self._index_microsoft_cvrf_get_serialize( page=page, limit=limit, cursor=cursor, @@ -183312,7 +183312,7 @@ async def index_microsoft_kb_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftKbPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftCVRFPaginatePagination", '404': "str", '500': "str", } @@ -183328,7 +183328,7 @@ async def index_microsoft_kb_get( @validate_call - async def index_microsoft_kb_get_with_http_info( + async def index_microsoft_cvrf_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -183366,10 +183366,10 @@ async def index_microsoft_kb_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMicrosoftKbPaginatePagination]: - """Return vulnerability data stored in index \"microsoft-kb\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMicrosoftCVRFPaginatePagination]: + """Return vulnerability data stored in index \"microsoft-cvrf\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-kb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft KB list by CVE ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-kb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-kb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-cvrf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-cvrf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-cvrf?cursor=` :param page: set the page number of the response :type page: int @@ -183441,7 +183441,7 @@ async def index_microsoft_kb_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_microsoft_kb_get_serialize( + _param = self._index_microsoft_cvrf_get_serialize( page=page, limit=limit, cursor=cursor, @@ -183473,7 +183473,7 @@ async def index_microsoft_kb_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftKbPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftCVRFPaginatePagination", '404': "str", '500': "str", } @@ -183489,7 +183489,7 @@ async def index_microsoft_kb_get_with_http_info( @validate_call - async def index_microsoft_kb_get_without_preload_content( + async def index_microsoft_cvrf_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -183528,9 +183528,9 @@ async def index_microsoft_kb_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"microsoft-kb\" + """Return vulnerability data stored in index \"microsoft-cvrf\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-kb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft KB list by CVE ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-kb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-kb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-cvrf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-cvrf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-cvrf?cursor=` :param page: set the page number of the response :type page: int @@ -183602,7 +183602,7 @@ async def index_microsoft_kb_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_microsoft_kb_get_serialize( + _param = self._index_microsoft_cvrf_get_serialize( page=page, limit=limit, cursor=cursor, @@ -183634,7 +183634,7 @@ async def index_microsoft_kb_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftKbPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftCVRFPaginatePagination", '404': "str", '500': "str", } @@ -183645,7 +183645,7 @@ async def index_microsoft_kb_get_without_preload_content( return response_data.response - def _index_microsoft_kb_get_serialize( + def _index_microsoft_cvrf_get_serialize( self, page, limit, @@ -183813,7 +183813,7 @@ def _index_microsoft_kb_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/microsoft-kb', + resource_path='/v3/index/microsoft-cvrf', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -183830,7 +183830,7 @@ def _index_microsoft_kb_get_serialize( @validate_call - async def index_mikrotik_get( + async def index_microsoft_driver_block_list_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -183868,10 +183868,10 @@ async def index_mikrotik_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMikrotikPaginatePagination: - """Return vulnerability data stored in index \"mikrotik\" + ) -> RenderResponseWithMetadataArrayAdvisoryMicrosoftDriverBlockListPaginatePagination: + """Return vulnerability data stored in index \"microsoft-driver-block-list\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mikrotik index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MikroTik Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mikrotik?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mikrotik?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-driver-block-list index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft's Vulnerable Drivers Blocklist ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-driver-block-list?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-driver-block-list?cursor=` :param page: set the page number of the response :type page: int @@ -183943,7 +183943,7 @@ async def index_mikrotik_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mikrotik_get_serialize( + _param = self._index_microsoft_driver_block_list_get_serialize( page=page, limit=limit, cursor=cursor, @@ -183975,7 +183975,7 @@ async def index_mikrotik_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMikrotikPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftDriverBlockListPaginatePagination", '404': "str", '500': "str", } @@ -183991,7 +183991,7 @@ async def index_mikrotik_get( @validate_call - async def index_mikrotik_get_with_http_info( + async def index_microsoft_driver_block_list_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -184029,10 +184029,10 @@ async def index_mikrotik_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMikrotikPaginatePagination]: - """Return vulnerability data stored in index \"mikrotik\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMicrosoftDriverBlockListPaginatePagination]: + """Return vulnerability data stored in index \"microsoft-driver-block-list\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mikrotik index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MikroTik Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mikrotik?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mikrotik?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-driver-block-list index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft's Vulnerable Drivers Blocklist ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-driver-block-list?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-driver-block-list?cursor=` :param page: set the page number of the response :type page: int @@ -184104,7 +184104,7 @@ async def index_mikrotik_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mikrotik_get_serialize( + _param = self._index_microsoft_driver_block_list_get_serialize( page=page, limit=limit, cursor=cursor, @@ -184136,7 +184136,7 @@ async def index_mikrotik_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMikrotikPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftDriverBlockListPaginatePagination", '404': "str", '500': "str", } @@ -184152,7 +184152,7 @@ async def index_mikrotik_get_with_http_info( @validate_call - async def index_mikrotik_get_without_preload_content( + async def index_microsoft_driver_block_list_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -184191,9 +184191,9 @@ async def index_mikrotik_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"mikrotik\" + """Return vulnerability data stored in index \"microsoft-driver-block-list\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mikrotik index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MikroTik Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mikrotik?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mikrotik?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-driver-block-list index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft's Vulnerable Drivers Blocklist ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-driver-block-list?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-driver-block-list?cursor=` :param page: set the page number of the response :type page: int @@ -184265,7 +184265,7 @@ async def index_mikrotik_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mikrotik_get_serialize( + _param = self._index_microsoft_driver_block_list_get_serialize( page=page, limit=limit, cursor=cursor, @@ -184297,7 +184297,7 @@ async def index_mikrotik_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMikrotikPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftDriverBlockListPaginatePagination", '404': "str", '500': "str", } @@ -184308,7 +184308,7 @@ async def index_mikrotik_get_without_preload_content( return response_data.response - def _index_mikrotik_get_serialize( + def _index_microsoft_driver_block_list_get_serialize( self, page, limit, @@ -184476,7 +184476,7 @@ def _index_mikrotik_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/mikrotik', + resource_path='/v3/index/microsoft-driver-block-list', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -184493,7 +184493,7 @@ def _index_mikrotik_get_serialize( @validate_call - async def index_mindray_get( + async def index_microsoft_kb_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -184531,10 +184531,10 @@ async def index_mindray_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMindrayPaginatePagination: - """Return vulnerability data stored in index \"mindray\" + ) -> RenderResponseWithMetadataArrayAdvisoryMicrosoftKbPaginatePagination: + """Return vulnerability data stored in index \"microsoft-kb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mindray index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mindray Cybersecurity Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mindray?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mindray?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-kb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft KB list by CVE ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-kb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-kb?cursor=` :param page: set the page number of the response :type page: int @@ -184606,7 +184606,7 @@ async def index_mindray_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mindray_get_serialize( + _param = self._index_microsoft_kb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -184638,7 +184638,7 @@ async def index_mindray_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMindrayPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftKbPaginatePagination", '404': "str", '500': "str", } @@ -184654,7 +184654,7 @@ async def index_mindray_get( @validate_call - async def index_mindray_get_with_http_info( + async def index_microsoft_kb_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -184692,10 +184692,10 @@ async def index_mindray_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMindrayPaginatePagination]: - """Return vulnerability data stored in index \"mindray\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMicrosoftKbPaginatePagination]: + """Return vulnerability data stored in index \"microsoft-kb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mindray index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mindray Cybersecurity Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mindray?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mindray?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-kb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft KB list by CVE ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-kb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-kb?cursor=` :param page: set the page number of the response :type page: int @@ -184767,7 +184767,7 @@ async def index_mindray_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mindray_get_serialize( + _param = self._index_microsoft_kb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -184799,7 +184799,7 @@ async def index_mindray_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMindrayPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftKbPaginatePagination", '404': "str", '500': "str", } @@ -184815,7 +184815,7 @@ async def index_mindray_get_with_http_info( @validate_call - async def index_mindray_get_without_preload_content( + async def index_microsoft_kb_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -184854,9 +184854,9 @@ async def index_mindray_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"mindray\" + """Return vulnerability data stored in index \"microsoft-kb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mindray index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mindray Cybersecurity Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mindray?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mindray?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-kb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft KB list by CVE ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-kb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-kb?cursor=` :param page: set the page number of the response :type page: int @@ -184928,7 +184928,7 @@ async def index_mindray_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mindray_get_serialize( + _param = self._index_microsoft_kb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -184960,7 +184960,7 @@ async def index_mindray_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMindrayPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftKbPaginatePagination", '404': "str", '500': "str", } @@ -184971,7 +184971,7 @@ async def index_mindray_get_without_preload_content( return response_data.response - def _index_mindray_get_serialize( + def _index_microsoft_kb_get_serialize( self, page, limit, @@ -185139,7 +185139,7 @@ def _index_mindray_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/mindray', + resource_path='/v3/index/microsoft-kb', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -185156,7 +185156,7 @@ def _index_mindray_get_serialize( @validate_call - async def index_misp_threat_actors_get( + async def index_mikrotik_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -185194,10 +185194,10 @@ async def index_misp_threat_actors_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMispValuePaginatePagination: - """Return vulnerability data stored in index \"misp-threat-actors\" + ) -> RenderResponseWithMetadataArrayAdvisoryMikrotikPaginatePagination: + """Return vulnerability data stored in index \"mikrotik\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the misp-threat-actors index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MISP Threat Actors ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/misp-threat-actors?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/misp-threat-actors?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mikrotik index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MikroTik Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mikrotik?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mikrotik?cursor=` :param page: set the page number of the response :type page: int @@ -185269,7 +185269,7 @@ async def index_misp_threat_actors_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_misp_threat_actors_get_serialize( + _param = self._index_mikrotik_get_serialize( page=page, limit=limit, cursor=cursor, @@ -185301,7 +185301,7 @@ async def index_misp_threat_actors_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMispValuePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMikrotikPaginatePagination", '404': "str", '500': "str", } @@ -185317,7 +185317,7 @@ async def index_misp_threat_actors_get( @validate_call - async def index_misp_threat_actors_get_with_http_info( + async def index_mikrotik_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -185355,10 +185355,10 @@ async def index_misp_threat_actors_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMispValuePaginatePagination]: - """Return vulnerability data stored in index \"misp-threat-actors\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMikrotikPaginatePagination]: + """Return vulnerability data stored in index \"mikrotik\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the misp-threat-actors index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MISP Threat Actors ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/misp-threat-actors?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/misp-threat-actors?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mikrotik index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MikroTik Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mikrotik?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mikrotik?cursor=` :param page: set the page number of the response :type page: int @@ -185430,7 +185430,7 @@ async def index_misp_threat_actors_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_misp_threat_actors_get_serialize( + _param = self._index_mikrotik_get_serialize( page=page, limit=limit, cursor=cursor, @@ -185462,7 +185462,7 @@ async def index_misp_threat_actors_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMispValuePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMikrotikPaginatePagination", '404': "str", '500': "str", } @@ -185478,7 +185478,7 @@ async def index_misp_threat_actors_get_with_http_info( @validate_call - async def index_misp_threat_actors_get_without_preload_content( + async def index_mikrotik_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -185517,9 +185517,9 @@ async def index_misp_threat_actors_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"misp-threat-actors\" + """Return vulnerability data stored in index \"mikrotik\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the misp-threat-actors index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MISP Threat Actors ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/misp-threat-actors?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/misp-threat-actors?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mikrotik index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MikroTik Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mikrotik?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mikrotik?cursor=` :param page: set the page number of the response :type page: int @@ -185591,7 +185591,7 @@ async def index_misp_threat_actors_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_misp_threat_actors_get_serialize( + _param = self._index_mikrotik_get_serialize( page=page, limit=limit, cursor=cursor, @@ -185623,7 +185623,7 @@ async def index_misp_threat_actors_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMispValuePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMikrotikPaginatePagination", '404': "str", '500': "str", } @@ -185634,7 +185634,7 @@ async def index_misp_threat_actors_get_without_preload_content( return response_data.response - def _index_misp_threat_actors_get_serialize( + def _index_mikrotik_get_serialize( self, page, limit, @@ -185802,7 +185802,7 @@ def _index_misp_threat_actors_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/misp-threat-actors', + resource_path='/v3/index/mikrotik', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -185819,7 +185819,7 @@ def _index_misp_threat_actors_get_serialize( @validate_call - async def index_mitel_get( + async def index_mindray_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -185857,10 +185857,10 @@ async def index_mitel_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMitelPaginatePagination: - """Return vulnerability data stored in index \"mitel\" + ) -> RenderResponseWithMetadataArrayAdvisoryMindrayPaginatePagination: + """Return vulnerability data stored in index \"mindray\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mitel Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitel?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mindray index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mindray Cybersecurity Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mindray?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mindray?cursor=` :param page: set the page number of the response :type page: int @@ -185932,7 +185932,7 @@ async def index_mitel_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mitel_get_serialize( + _param = self._index_mindray_get_serialize( page=page, limit=limit, cursor=cursor, @@ -185964,7 +185964,7 @@ async def index_mitel_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMitelPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMindrayPaginatePagination", '404': "str", '500': "str", } @@ -185980,7 +185980,7 @@ async def index_mitel_get( @validate_call - async def index_mitel_get_with_http_info( + async def index_mindray_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -186018,10 +186018,10 @@ async def index_mitel_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMitelPaginatePagination]: - """Return vulnerability data stored in index \"mitel\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMindrayPaginatePagination]: + """Return vulnerability data stored in index \"mindray\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mitel Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitel?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mindray index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mindray Cybersecurity Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mindray?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mindray?cursor=` :param page: set the page number of the response :type page: int @@ -186093,7 +186093,7 @@ async def index_mitel_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mitel_get_serialize( + _param = self._index_mindray_get_serialize( page=page, limit=limit, cursor=cursor, @@ -186125,7 +186125,7 @@ async def index_mitel_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMitelPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMindrayPaginatePagination", '404': "str", '500': "str", } @@ -186141,7 +186141,7 @@ async def index_mitel_get_with_http_info( @validate_call - async def index_mitel_get_without_preload_content( + async def index_mindray_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -186180,9 +186180,9 @@ async def index_mitel_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"mitel\" + """Return vulnerability data stored in index \"mindray\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mitel Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitel?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mindray index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mindray Cybersecurity Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mindray?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mindray?cursor=` :param page: set the page number of the response :type page: int @@ -186254,7 +186254,7 @@ async def index_mitel_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mitel_get_serialize( + _param = self._index_mindray_get_serialize( page=page, limit=limit, cursor=cursor, @@ -186286,7 +186286,7 @@ async def index_mitel_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMitelPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMindrayPaginatePagination", '404': "str", '500': "str", } @@ -186297,7 +186297,7 @@ async def index_mitel_get_without_preload_content( return response_data.response - def _index_mitel_get_serialize( + def _index_mindray_get_serialize( self, page, limit, @@ -186465,7 +186465,7 @@ def _index_mitel_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/mitel', + resource_path='/v3/index/mindray', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -186482,7 +186482,7 @@ def _index_mitel_get_serialize( @validate_call - async def index_mitre_attack_cve_get( + async def index_misp_threat_actors_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -186520,10 +186520,10 @@ async def index_mitre_attack_cve_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiMitreAttackToCVEPaginatePagination: - """Return vulnerability data stored in index \"mitre-attack-cve\" + ) -> RenderResponseWithMetadataArrayAdvisoryMispValuePaginatePagination: + """Return vulnerability data stored in index \"misp-threat-actors\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitre-attack-cve index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MITRE ATT&CK Technique ID to CVE List ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-attack-cve?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitre-attack-cve?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the misp-threat-actors index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MISP Threat Actors ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/misp-threat-actors?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/misp-threat-actors?cursor=` :param page: set the page number of the response :type page: int @@ -186595,7 +186595,7 @@ async def index_mitre_attack_cve_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mitre_attack_cve_get_serialize( + _param = self._index_misp_threat_actors_get_serialize( page=page, limit=limit, cursor=cursor, @@ -186627,7 +186627,7 @@ async def index_mitre_attack_cve_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiMitreAttackToCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMispValuePaginatePagination", '404': "str", '500': "str", } @@ -186643,7 +186643,7 @@ async def index_mitre_attack_cve_get( @validate_call - async def index_mitre_attack_cve_get_with_http_info( + async def index_misp_threat_actors_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -186681,10 +186681,10 @@ async def index_mitre_attack_cve_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiMitreAttackToCVEPaginatePagination]: - """Return vulnerability data stored in index \"mitre-attack-cve\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMispValuePaginatePagination]: + """Return vulnerability data stored in index \"misp-threat-actors\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitre-attack-cve index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MITRE ATT&CK Technique ID to CVE List ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-attack-cve?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitre-attack-cve?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the misp-threat-actors index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MISP Threat Actors ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/misp-threat-actors?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/misp-threat-actors?cursor=` :param page: set the page number of the response :type page: int @@ -186756,7 +186756,7 @@ async def index_mitre_attack_cve_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mitre_attack_cve_get_serialize( + _param = self._index_misp_threat_actors_get_serialize( page=page, limit=limit, cursor=cursor, @@ -186788,7 +186788,7 @@ async def index_mitre_attack_cve_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiMitreAttackToCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMispValuePaginatePagination", '404': "str", '500': "str", } @@ -186804,7 +186804,7 @@ async def index_mitre_attack_cve_get_with_http_info( @validate_call - async def index_mitre_attack_cve_get_without_preload_content( + async def index_misp_threat_actors_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -186843,9 +186843,9 @@ async def index_mitre_attack_cve_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"mitre-attack-cve\" + """Return vulnerability data stored in index \"misp-threat-actors\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitre-attack-cve index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MITRE ATT&CK Technique ID to CVE List ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-attack-cve?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitre-attack-cve?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the misp-threat-actors index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MISP Threat Actors ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/misp-threat-actors?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/misp-threat-actors?cursor=` :param page: set the page number of the response :type page: int @@ -186917,7 +186917,7 @@ async def index_mitre_attack_cve_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mitre_attack_cve_get_serialize( + _param = self._index_misp_threat_actors_get_serialize( page=page, limit=limit, cursor=cursor, @@ -186949,7 +186949,7 @@ async def index_mitre_attack_cve_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiMitreAttackToCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMispValuePaginatePagination", '404': "str", '500': "str", } @@ -186960,7 +186960,7 @@ async def index_mitre_attack_cve_get_without_preload_content( return response_data.response - def _index_mitre_attack_cve_get_serialize( + def _index_misp_threat_actors_get_serialize( self, page, limit, @@ -187128,7 +187128,7 @@ def _index_mitre_attack_cve_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/mitre-attack-cve', + resource_path='/v3/index/misp-threat-actors', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -187145,7 +187145,7 @@ def _index_mitre_attack_cve_get_serialize( @validate_call - async def index_mitre_cvelist_v5_get( + async def index_mitel_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -187183,10 +187183,10 @@ async def index_mitre_cvelist_v5_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMitreCVEListV5PaginatePagination: - """Return vulnerability data stored in index \"mitre-cvelist-v5\" + ) -> RenderResponseWithMetadataArrayAdvisoryMitelPaginatePagination: + """Return vulnerability data stored in index \"mitel\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitre-cvelist-v5 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MITRE CVEList V5 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-cvelist-v5?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitre-cvelist-v5?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mitel Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitel?cursor=` :param page: set the page number of the response :type page: int @@ -187258,7 +187258,7 @@ async def index_mitre_cvelist_v5_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mitre_cvelist_v5_get_serialize( + _param = self._index_mitel_get_serialize( page=page, limit=limit, cursor=cursor, @@ -187290,7 +187290,7 @@ async def index_mitre_cvelist_v5_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMitreCVEListV5PaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMitelPaginatePagination", '404': "str", '500': "str", } @@ -187306,7 +187306,7 @@ async def index_mitre_cvelist_v5_get( @validate_call - async def index_mitre_cvelist_v5_get_with_http_info( + async def index_mitel_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -187344,10 +187344,10 @@ async def index_mitre_cvelist_v5_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMitreCVEListV5PaginatePagination]: - """Return vulnerability data stored in index \"mitre-cvelist-v5\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMitelPaginatePagination]: + """Return vulnerability data stored in index \"mitel\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitre-cvelist-v5 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MITRE CVEList V5 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-cvelist-v5?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitre-cvelist-v5?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mitel Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitel?cursor=` :param page: set the page number of the response :type page: int @@ -187419,7 +187419,7 @@ async def index_mitre_cvelist_v5_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mitre_cvelist_v5_get_serialize( + _param = self._index_mitel_get_serialize( page=page, limit=limit, cursor=cursor, @@ -187451,7 +187451,7 @@ async def index_mitre_cvelist_v5_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMitreCVEListV5PaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMitelPaginatePagination", '404': "str", '500': "str", } @@ -187467,7 +187467,7 @@ async def index_mitre_cvelist_v5_get_with_http_info( @validate_call - async def index_mitre_cvelist_v5_get_without_preload_content( + async def index_mitel_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -187506,9 +187506,9 @@ async def index_mitre_cvelist_v5_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"mitre-cvelist-v5\" + """Return vulnerability data stored in index \"mitel\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitre-cvelist-v5 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MITRE CVEList V5 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-cvelist-v5?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitre-cvelist-v5?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mitel Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitel?cursor=` :param page: set the page number of the response :type page: int @@ -187580,7 +187580,7 @@ async def index_mitre_cvelist_v5_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mitre_cvelist_v5_get_serialize( + _param = self._index_mitel_get_serialize( page=page, limit=limit, cursor=cursor, @@ -187612,7 +187612,7 @@ async def index_mitre_cvelist_v5_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMitreCVEListV5PaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMitelPaginatePagination", '404': "str", '500': "str", } @@ -187623,7 +187623,7 @@ async def index_mitre_cvelist_v5_get_without_preload_content( return response_data.response - def _index_mitre_cvelist_v5_get_serialize( + def _index_mitel_get_serialize( self, page, limit, @@ -187791,7 +187791,7 @@ def _index_mitre_cvelist_v5_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/mitre-cvelist-v5', + resource_path='/v3/index/mitel', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -187808,7 +187808,7 @@ def _index_mitre_cvelist_v5_get_serialize( @validate_call - async def index_mitsubishi_electric_get( + async def index_mitre_attack_cve_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -187846,10 +187846,10 @@ async def index_mitsubishi_electric_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMitsubishiElectricAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"mitsubishi-electric\" + ) -> RenderResponseWithMetadataArrayApiMitreAttackToCVEPaginatePagination: + """Return vulnerability data stored in index \"mitre-attack-cve\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitsubishi-electric index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mitsubishi Electric Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitsubishi-electric?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitsubishi-electric?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitre-attack-cve index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MITRE ATT&CK Technique ID to CVE List ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-attack-cve?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitre-attack-cve?cursor=` :param page: set the page number of the response :type page: int @@ -187921,7 +187921,7 @@ async def index_mitsubishi_electric_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mitsubishi_electric_get_serialize( + _param = self._index_mitre_attack_cve_get_serialize( page=page, limit=limit, cursor=cursor, @@ -187953,7 +187953,7 @@ async def index_mitsubishi_electric_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMitsubishiElectricAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiMitreAttackToCVEPaginatePagination", '404': "str", '500': "str", } @@ -187969,7 +187969,7 @@ async def index_mitsubishi_electric_get( @validate_call - async def index_mitsubishi_electric_get_with_http_info( + async def index_mitre_attack_cve_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -188007,10 +188007,10 @@ async def index_mitsubishi_electric_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMitsubishiElectricAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"mitsubishi-electric\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiMitreAttackToCVEPaginatePagination]: + """Return vulnerability data stored in index \"mitre-attack-cve\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitsubishi-electric index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mitsubishi Electric Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitsubishi-electric?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitsubishi-electric?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitre-attack-cve index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MITRE ATT&CK Technique ID to CVE List ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-attack-cve?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitre-attack-cve?cursor=` :param page: set the page number of the response :type page: int @@ -188082,7 +188082,7 @@ async def index_mitsubishi_electric_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mitsubishi_electric_get_serialize( + _param = self._index_mitre_attack_cve_get_serialize( page=page, limit=limit, cursor=cursor, @@ -188114,7 +188114,7 @@ async def index_mitsubishi_electric_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMitsubishiElectricAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiMitreAttackToCVEPaginatePagination", '404': "str", '500': "str", } @@ -188130,7 +188130,7 @@ async def index_mitsubishi_electric_get_with_http_info( @validate_call - async def index_mitsubishi_electric_get_without_preload_content( + async def index_mitre_attack_cve_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -188169,9 +188169,9 @@ async def index_mitsubishi_electric_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"mitsubishi-electric\" + """Return vulnerability data stored in index \"mitre-attack-cve\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitsubishi-electric index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mitsubishi Electric Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitsubishi-electric?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitsubishi-electric?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitre-attack-cve index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MITRE ATT&CK Technique ID to CVE List ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-attack-cve?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitre-attack-cve?cursor=` :param page: set the page number of the response :type page: int @@ -188243,7 +188243,7 @@ async def index_mitsubishi_electric_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mitsubishi_electric_get_serialize( + _param = self._index_mitre_attack_cve_get_serialize( page=page, limit=limit, cursor=cursor, @@ -188275,7 +188275,7 @@ async def index_mitsubishi_electric_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMitsubishiElectricAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiMitreAttackToCVEPaginatePagination", '404': "str", '500': "str", } @@ -188286,7 +188286,7 @@ async def index_mitsubishi_electric_get_without_preload_content( return response_data.response - def _index_mitsubishi_electric_get_serialize( + def _index_mitre_attack_cve_get_serialize( self, page, limit, @@ -188454,7 +188454,7 @@ def _index_mitsubishi_electric_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/mitsubishi-electric', + resource_path='/v3/index/mitre-attack-cve', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -188471,7 +188471,7 @@ def _index_mitsubishi_electric_get_serialize( @validate_call - async def index_mongodb_get( + async def index_mitre_cvelist_v5_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -188509,10 +188509,10 @@ async def index_mongodb_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMongoDBPaginatePagination: - """Return vulnerability data stored in index \"mongodb\" + ) -> RenderResponseWithMetadataArrayAdvisoryMitreCVEListV5PaginatePagination: + """Return vulnerability data stored in index \"mitre-cvelist-v5\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mongodb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MongoDB Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mongodb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mongodb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitre-cvelist-v5 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MITRE CVEList V5 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-cvelist-v5?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitre-cvelist-v5?cursor=` :param page: set the page number of the response :type page: int @@ -188584,7 +188584,7 @@ async def index_mongodb_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mongodb_get_serialize( + _param = self._index_mitre_cvelist_v5_get_serialize( page=page, limit=limit, cursor=cursor, @@ -188616,7 +188616,7 @@ async def index_mongodb_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMongoDBPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMitreCVEListV5PaginatePagination", '404': "str", '500': "str", } @@ -188632,7 +188632,7 @@ async def index_mongodb_get( @validate_call - async def index_mongodb_get_with_http_info( + async def index_mitre_cvelist_v5_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -188670,10 +188670,10 @@ async def index_mongodb_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMongoDBPaginatePagination]: - """Return vulnerability data stored in index \"mongodb\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMitreCVEListV5PaginatePagination]: + """Return vulnerability data stored in index \"mitre-cvelist-v5\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mongodb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MongoDB Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mongodb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mongodb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitre-cvelist-v5 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MITRE CVEList V5 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-cvelist-v5?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitre-cvelist-v5?cursor=` :param page: set the page number of the response :type page: int @@ -188745,7 +188745,7 @@ async def index_mongodb_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mongodb_get_serialize( + _param = self._index_mitre_cvelist_v5_get_serialize( page=page, limit=limit, cursor=cursor, @@ -188777,7 +188777,7 @@ async def index_mongodb_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMongoDBPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMitreCVEListV5PaginatePagination", '404': "str", '500': "str", } @@ -188793,7 +188793,7 @@ async def index_mongodb_get_with_http_info( @validate_call - async def index_mongodb_get_without_preload_content( + async def index_mitre_cvelist_v5_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -188832,9 +188832,9 @@ async def index_mongodb_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"mongodb\" + """Return vulnerability data stored in index \"mitre-cvelist-v5\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mongodb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MongoDB Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mongodb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mongodb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitre-cvelist-v5 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MITRE CVEList V5 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-cvelist-v5?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitre-cvelist-v5?cursor=` :param page: set the page number of the response :type page: int @@ -188906,7 +188906,7 @@ async def index_mongodb_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mongodb_get_serialize( + _param = self._index_mitre_cvelist_v5_get_serialize( page=page, limit=limit, cursor=cursor, @@ -188938,7 +188938,7 @@ async def index_mongodb_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMongoDBPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMitreCVEListV5PaginatePagination", '404': "str", '500': "str", } @@ -188949,7 +188949,7 @@ async def index_mongodb_get_without_preload_content( return response_data.response - def _index_mongodb_get_serialize( + def _index_mitre_cvelist_v5_get_serialize( self, page, limit, @@ -189117,7 +189117,7 @@ def _index_mongodb_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/mongodb', + resource_path='/v3/index/mitre-cvelist-v5', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -189134,7 +189134,7 @@ def _index_mongodb_get_serialize( @validate_call - async def index_moxa_get( + async def index_mitsubishi_electric_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -189172,10 +189172,10 @@ async def index_moxa_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMoxaAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"moxa\" + ) -> RenderResponseWithMetadataArrayAdvisoryMitsubishiElectricAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"mitsubishi-electric\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the moxa index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Moxa Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/moxa?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/moxa?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitsubishi-electric index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mitsubishi Electric Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitsubishi-electric?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitsubishi-electric?cursor=` :param page: set the page number of the response :type page: int @@ -189247,7 +189247,7 @@ async def index_moxa_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_moxa_get_serialize( + _param = self._index_mitsubishi_electric_get_serialize( page=page, limit=limit, cursor=cursor, @@ -189279,7 +189279,7 @@ async def index_moxa_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMoxaAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMitsubishiElectricAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -189295,7 +189295,7 @@ async def index_moxa_get( @validate_call - async def index_moxa_get_with_http_info( + async def index_mitsubishi_electric_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -189333,10 +189333,10 @@ async def index_moxa_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMoxaAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"moxa\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMitsubishiElectricAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"mitsubishi-electric\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the moxa index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Moxa Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/moxa?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/moxa?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitsubishi-electric index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mitsubishi Electric Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitsubishi-electric?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitsubishi-electric?cursor=` :param page: set the page number of the response :type page: int @@ -189408,7 +189408,7 @@ async def index_moxa_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_moxa_get_serialize( + _param = self._index_mitsubishi_electric_get_serialize( page=page, limit=limit, cursor=cursor, @@ -189440,7 +189440,7 @@ async def index_moxa_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMoxaAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMitsubishiElectricAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -189456,7 +189456,7 @@ async def index_moxa_get_with_http_info( @validate_call - async def index_moxa_get_without_preload_content( + async def index_mitsubishi_electric_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -189495,9 +189495,9 @@ async def index_moxa_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"moxa\" + """Return vulnerability data stored in index \"mitsubishi-electric\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the moxa index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Moxa Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/moxa?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/moxa?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitsubishi-electric index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mitsubishi Electric Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitsubishi-electric?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitsubishi-electric?cursor=` :param page: set the page number of the response :type page: int @@ -189569,7 +189569,7 @@ async def index_moxa_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_moxa_get_serialize( + _param = self._index_mitsubishi_electric_get_serialize( page=page, limit=limit, cursor=cursor, @@ -189601,7 +189601,7 @@ async def index_moxa_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMoxaAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMitsubishiElectricAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -189612,7 +189612,7 @@ async def index_moxa_get_without_preload_content( return response_data.response - def _index_moxa_get_serialize( + def _index_mitsubishi_electric_get_serialize( self, page, limit, @@ -189780,7 +189780,7 @@ def _index_moxa_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/moxa', + resource_path='/v3/index/mitsubishi-electric', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -189797,7 +189797,7 @@ def _index_moxa_get_serialize( @validate_call - async def index_mozilla_get( + async def index_mongodb_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -189835,10 +189835,10 @@ async def index_mozilla_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMozillaAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"mozilla\" + ) -> RenderResponseWithMetadataArrayAdvisoryMongoDBPaginatePagination: + """Return vulnerability data stored in index \"mongodb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mozilla index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mozilla Foundation Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mozilla?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mozilla?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mongodb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MongoDB Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mongodb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mongodb?cursor=` :param page: set the page number of the response :type page: int @@ -189910,7 +189910,7 @@ async def index_mozilla_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mozilla_get_serialize( + _param = self._index_mongodb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -189942,7 +189942,7 @@ async def index_mozilla_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMozillaAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMongoDBPaginatePagination", '404': "str", '500': "str", } @@ -189958,7 +189958,7 @@ async def index_mozilla_get( @validate_call - async def index_mozilla_get_with_http_info( + async def index_mongodb_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -189996,10 +189996,10 @@ async def index_mozilla_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMozillaAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"mozilla\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMongoDBPaginatePagination]: + """Return vulnerability data stored in index \"mongodb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mozilla index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mozilla Foundation Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mozilla?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mozilla?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mongodb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MongoDB Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mongodb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mongodb?cursor=` :param page: set the page number of the response :type page: int @@ -190071,7 +190071,7 @@ async def index_mozilla_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mozilla_get_serialize( + _param = self._index_mongodb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -190103,7 +190103,7 @@ async def index_mozilla_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMozillaAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMongoDBPaginatePagination", '404': "str", '500': "str", } @@ -190119,7 +190119,7 @@ async def index_mozilla_get_with_http_info( @validate_call - async def index_mozilla_get_without_preload_content( + async def index_mongodb_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -190158,9 +190158,9 @@ async def index_mozilla_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"mozilla\" + """Return vulnerability data stored in index \"mongodb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mozilla index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mozilla Foundation Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mozilla?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mozilla?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mongodb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MongoDB Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mongodb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mongodb?cursor=` :param page: set the page number of the response :type page: int @@ -190232,7 +190232,7 @@ async def index_mozilla_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mozilla_get_serialize( + _param = self._index_mongodb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -190264,7 +190264,7 @@ async def index_mozilla_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMozillaAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMongoDBPaginatePagination", '404': "str", '500': "str", } @@ -190275,7 +190275,7 @@ async def index_mozilla_get_without_preload_content( return response_data.response - def _index_mozilla_get_serialize( + def _index_mongodb_get_serialize( self, page, limit, @@ -190443,7 +190443,7 @@ def _index_mozilla_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/mozilla', + resource_path='/v3/index/mongodb', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -190460,7 +190460,7 @@ def _index_mozilla_get_serialize( @validate_call - async def index_naver_get( + async def index_moxa_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -190498,10 +190498,10 @@ async def index_naver_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNaverPaginatePagination: - """Return vulnerability data stored in index \"naver\" + ) -> RenderResponseWithMetadataArrayAdvisoryMoxaAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"moxa\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the naver index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Naver Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/naver?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/naver?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the moxa index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Moxa Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/moxa?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/moxa?cursor=` :param page: set the page number of the response :type page: int @@ -190573,7 +190573,7 @@ async def index_naver_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_naver_get_serialize( + _param = self._index_moxa_get_serialize( page=page, limit=limit, cursor=cursor, @@ -190605,7 +190605,7 @@ async def index_naver_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNaverPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMoxaAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -190621,7 +190621,7 @@ async def index_naver_get( @validate_call - async def index_naver_get_with_http_info( + async def index_moxa_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -190659,10 +190659,10 @@ async def index_naver_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNaverPaginatePagination]: - """Return vulnerability data stored in index \"naver\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMoxaAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"moxa\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the naver index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Naver Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/naver?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/naver?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the moxa index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Moxa Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/moxa?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/moxa?cursor=` :param page: set the page number of the response :type page: int @@ -190734,7 +190734,7 @@ async def index_naver_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_naver_get_serialize( + _param = self._index_moxa_get_serialize( page=page, limit=limit, cursor=cursor, @@ -190766,7 +190766,7 @@ async def index_naver_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNaverPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMoxaAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -190782,7 +190782,7 @@ async def index_naver_get_with_http_info( @validate_call - async def index_naver_get_without_preload_content( + async def index_moxa_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -190821,9 +190821,9 @@ async def index_naver_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"naver\" + """Return vulnerability data stored in index \"moxa\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the naver index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Naver Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/naver?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/naver?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the moxa index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Moxa Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/moxa?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/moxa?cursor=` :param page: set the page number of the response :type page: int @@ -190895,7 +190895,7 @@ async def index_naver_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_naver_get_serialize( + _param = self._index_moxa_get_serialize( page=page, limit=limit, cursor=cursor, @@ -190927,7 +190927,7 @@ async def index_naver_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNaverPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMoxaAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -190938,7 +190938,7 @@ async def index_naver_get_without_preload_content( return response_data.response - def _index_naver_get_serialize( + def _index_moxa_get_serialize( self, page, limit, @@ -191106,7 +191106,7 @@ def _index_naver_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/naver', + resource_path='/v3/index/moxa', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -191123,7 +191123,7 @@ def _index_naver_get_serialize( @validate_call - async def index_ncsc_cves_get( + async def index_mozilla_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -191161,10 +191161,10 @@ async def index_ncsc_cves_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNCSCCVEPaginatePagination: - """Return vulnerability data stored in index \"ncsc-cves\" + ) -> RenderResponseWithMetadataArrayAdvisoryMozillaAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"mozilla\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ncsc-cves index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NCSC CVEs ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc-cves?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ncsc-cves?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mozilla index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mozilla Foundation Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mozilla?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mozilla?cursor=` :param page: set the page number of the response :type page: int @@ -191236,7 +191236,7 @@ async def index_ncsc_cves_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ncsc_cves_get_serialize( + _param = self._index_mozilla_get_serialize( page=page, limit=limit, cursor=cursor, @@ -191268,7 +191268,7 @@ async def index_ncsc_cves_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNCSCCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMozillaAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -191284,7 +191284,7 @@ async def index_ncsc_cves_get( @validate_call - async def index_ncsc_cves_get_with_http_info( + async def index_mozilla_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -191322,10 +191322,10 @@ async def index_ncsc_cves_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNCSCCVEPaginatePagination]: - """Return vulnerability data stored in index \"ncsc-cves\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMozillaAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"mozilla\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ncsc-cves index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NCSC CVEs ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc-cves?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ncsc-cves?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mozilla index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mozilla Foundation Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mozilla?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mozilla?cursor=` :param page: set the page number of the response :type page: int @@ -191397,7 +191397,7 @@ async def index_ncsc_cves_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ncsc_cves_get_serialize( + _param = self._index_mozilla_get_serialize( page=page, limit=limit, cursor=cursor, @@ -191429,7 +191429,7 @@ async def index_ncsc_cves_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNCSCCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMozillaAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -191445,7 +191445,7 @@ async def index_ncsc_cves_get_with_http_info( @validate_call - async def index_ncsc_cves_get_without_preload_content( + async def index_mozilla_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -191484,9 +191484,9 @@ async def index_ncsc_cves_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ncsc-cves\" + """Return vulnerability data stored in index \"mozilla\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ncsc-cves index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NCSC CVEs ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc-cves?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ncsc-cves?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mozilla index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mozilla Foundation Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mozilla?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mozilla?cursor=` :param page: set the page number of the response :type page: int @@ -191558,7 +191558,7 @@ async def index_ncsc_cves_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ncsc_cves_get_serialize( + _param = self._index_mozilla_get_serialize( page=page, limit=limit, cursor=cursor, @@ -191590,7 +191590,7 @@ async def index_ncsc_cves_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNCSCCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMozillaAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -191601,7 +191601,7 @@ async def index_ncsc_cves_get_without_preload_content( return response_data.response - def _index_ncsc_cves_get_serialize( + def _index_mozilla_get_serialize( self, page, limit, @@ -191769,7 +191769,7 @@ def _index_ncsc_cves_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ncsc-cves', + resource_path='/v3/index/mozilla', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -191786,7 +191786,7 @@ def _index_ncsc_cves_get_serialize( @validate_call - async def index_ncsc_get( + async def index_naver_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -191824,10 +191824,10 @@ async def index_ncsc_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNCSCPaginatePagination: - """Return vulnerability data stored in index \"ncsc\" + ) -> RenderResponseWithMetadataArrayAdvisoryNaverPaginatePagination: + """Return vulnerability data stored in index \"naver\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ncsc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NCSC Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ncsc?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the naver index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Naver Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/naver?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/naver?cursor=` :param page: set the page number of the response :type page: int @@ -191899,7 +191899,7 @@ async def index_ncsc_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ncsc_get_serialize( + _param = self._index_naver_get_serialize( page=page, limit=limit, cursor=cursor, @@ -191931,7 +191931,7 @@ async def index_ncsc_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNCSCPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNaverPaginatePagination", '404': "str", '500': "str", } @@ -191947,7 +191947,7 @@ async def index_ncsc_get( @validate_call - async def index_ncsc_get_with_http_info( + async def index_naver_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -191985,10 +191985,10 @@ async def index_ncsc_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNCSCPaginatePagination]: - """Return vulnerability data stored in index \"ncsc\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNaverPaginatePagination]: + """Return vulnerability data stored in index \"naver\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ncsc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NCSC Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ncsc?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the naver index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Naver Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/naver?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/naver?cursor=` :param page: set the page number of the response :type page: int @@ -192060,7 +192060,7 @@ async def index_ncsc_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ncsc_get_serialize( + _param = self._index_naver_get_serialize( page=page, limit=limit, cursor=cursor, @@ -192092,7 +192092,7 @@ async def index_ncsc_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNCSCPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNaverPaginatePagination", '404': "str", '500': "str", } @@ -192108,7 +192108,7 @@ async def index_ncsc_get_with_http_info( @validate_call - async def index_ncsc_get_without_preload_content( + async def index_naver_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -192147,9 +192147,9 @@ async def index_ncsc_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ncsc\" + """Return vulnerability data stored in index \"naver\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ncsc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NCSC Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ncsc?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the naver index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Naver Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/naver?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/naver?cursor=` :param page: set the page number of the response :type page: int @@ -192221,7 +192221,7 @@ async def index_ncsc_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ncsc_get_serialize( + _param = self._index_naver_get_serialize( page=page, limit=limit, cursor=cursor, @@ -192253,7 +192253,7 @@ async def index_ncsc_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNCSCPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNaverPaginatePagination", '404': "str", '500': "str", } @@ -192264,7 +192264,7 @@ async def index_ncsc_get_without_preload_content( return response_data.response - def _index_ncsc_get_serialize( + def _index_naver_get_serialize( self, page, limit, @@ -192432,7 +192432,7 @@ def _index_ncsc_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ncsc', + resource_path='/v3/index/naver', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -192449,7 +192449,7 @@ def _index_ncsc_get_serialize( @validate_call - async def index_nec_get( + async def index_ncsc_cves_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -192487,10 +192487,10 @@ async def index_nec_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNECPaginatePagination: - """Return vulnerability data stored in index \"nec\" + ) -> RenderResponseWithMetadataArrayAdvisoryNCSCCVEPaginatePagination: + """Return vulnerability data stored in index \"ncsc-cves\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nec index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NEC Security Information Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nec?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nec?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ncsc-cves index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NCSC CVEs ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc-cves?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ncsc-cves?cursor=` :param page: set the page number of the response :type page: int @@ -192562,7 +192562,7 @@ async def index_nec_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nec_get_serialize( + _param = self._index_ncsc_cves_get_serialize( page=page, limit=limit, cursor=cursor, @@ -192594,7 +192594,7 @@ async def index_nec_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNECPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNCSCCVEPaginatePagination", '404': "str", '500': "str", } @@ -192610,7 +192610,7 @@ async def index_nec_get( @validate_call - async def index_nec_get_with_http_info( + async def index_ncsc_cves_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -192648,10 +192648,10 @@ async def index_nec_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNECPaginatePagination]: - """Return vulnerability data stored in index \"nec\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNCSCCVEPaginatePagination]: + """Return vulnerability data stored in index \"ncsc-cves\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nec index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NEC Security Information Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nec?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nec?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ncsc-cves index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NCSC CVEs ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc-cves?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ncsc-cves?cursor=` :param page: set the page number of the response :type page: int @@ -192723,7 +192723,7 @@ async def index_nec_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nec_get_serialize( + _param = self._index_ncsc_cves_get_serialize( page=page, limit=limit, cursor=cursor, @@ -192755,7 +192755,7 @@ async def index_nec_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNECPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNCSCCVEPaginatePagination", '404': "str", '500': "str", } @@ -192771,7 +192771,7 @@ async def index_nec_get_with_http_info( @validate_call - async def index_nec_get_without_preload_content( + async def index_ncsc_cves_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -192810,9 +192810,9 @@ async def index_nec_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"nec\" + """Return vulnerability data stored in index \"ncsc-cves\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nec index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NEC Security Information Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nec?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nec?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ncsc-cves index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NCSC CVEs ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc-cves?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ncsc-cves?cursor=` :param page: set the page number of the response :type page: int @@ -192884,7 +192884,7 @@ async def index_nec_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nec_get_serialize( + _param = self._index_ncsc_cves_get_serialize( page=page, limit=limit, cursor=cursor, @@ -192916,7 +192916,7 @@ async def index_nec_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNECPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNCSCCVEPaginatePagination", '404': "str", '500': "str", } @@ -192927,7 +192927,7 @@ async def index_nec_get_without_preload_content( return response_data.response - def _index_nec_get_serialize( + def _index_ncsc_cves_get_serialize( self, page, limit, @@ -193095,7 +193095,7 @@ def _index_nec_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/nec', + resource_path='/v3/index/ncsc-cves', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -193112,7 +193112,7 @@ def _index_nec_get_serialize( @validate_call - async def index_nessus_get( + async def index_ncsc_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -193150,10 +193150,10 @@ async def index_nessus_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNessusPaginatePagination: - """Return vulnerability data stored in index \"nessus\" + ) -> RenderResponseWithMetadataArrayAdvisoryNCSCPaginatePagination: + """Return vulnerability data stored in index \"ncsc\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nessus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nessus Plugins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nessus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nessus?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ncsc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NCSC Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ncsc?cursor=` :param page: set the page number of the response :type page: int @@ -193225,7 +193225,7 @@ async def index_nessus_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nessus_get_serialize( + _param = self._index_ncsc_get_serialize( page=page, limit=limit, cursor=cursor, @@ -193257,7 +193257,7 @@ async def index_nessus_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNessusPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNCSCPaginatePagination", '404': "str", '500': "str", } @@ -193273,7 +193273,7 @@ async def index_nessus_get( @validate_call - async def index_nessus_get_with_http_info( + async def index_ncsc_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -193311,10 +193311,10 @@ async def index_nessus_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNessusPaginatePagination]: - """Return vulnerability data stored in index \"nessus\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNCSCPaginatePagination]: + """Return vulnerability data stored in index \"ncsc\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nessus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nessus Plugins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nessus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nessus?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ncsc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NCSC Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ncsc?cursor=` :param page: set the page number of the response :type page: int @@ -193386,7 +193386,7 @@ async def index_nessus_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nessus_get_serialize( + _param = self._index_ncsc_get_serialize( page=page, limit=limit, cursor=cursor, @@ -193418,7 +193418,7 @@ async def index_nessus_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNessusPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNCSCPaginatePagination", '404': "str", '500': "str", } @@ -193434,7 +193434,7 @@ async def index_nessus_get_with_http_info( @validate_call - async def index_nessus_get_without_preload_content( + async def index_ncsc_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -193473,9 +193473,9 @@ async def index_nessus_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"nessus\" + """Return vulnerability data stored in index \"ncsc\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nessus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nessus Plugins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nessus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nessus?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ncsc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NCSC Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ncsc?cursor=` :param page: set the page number of the response :type page: int @@ -193547,7 +193547,7 @@ async def index_nessus_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nessus_get_serialize( + _param = self._index_ncsc_get_serialize( page=page, limit=limit, cursor=cursor, @@ -193579,7 +193579,7 @@ async def index_nessus_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNessusPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNCSCPaginatePagination", '404': "str", '500': "str", } @@ -193590,7 +193590,7 @@ async def index_nessus_get_without_preload_content( return response_data.response - def _index_nessus_get_serialize( + def _index_ncsc_get_serialize( self, page, limit, @@ -193758,7 +193758,7 @@ def _index_nessus_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/nessus', + resource_path='/v3/index/ncsc', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -193775,7 +193775,7 @@ def _index_nessus_get_serialize( @validate_call - async def index_netapp_get( + async def index_nec_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -193813,10 +193813,10 @@ async def index_netapp_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNetAppPaginatePagination: - """Return vulnerability data stored in index \"netapp\" + ) -> RenderResponseWithMetadataArrayAdvisoryNECPaginatePagination: + """Return vulnerability data stored in index \"nec\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netapp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NetApp Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netapp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netapp?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nec index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NEC Security Information Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nec?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nec?cursor=` :param page: set the page number of the response :type page: int @@ -193888,7 +193888,7 @@ async def index_netapp_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_netapp_get_serialize( + _param = self._index_nec_get_serialize( page=page, limit=limit, cursor=cursor, @@ -193920,7 +193920,7 @@ async def index_netapp_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNetAppPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNECPaginatePagination", '404': "str", '500': "str", } @@ -193936,7 +193936,7 @@ async def index_netapp_get( @validate_call - async def index_netapp_get_with_http_info( + async def index_nec_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -193974,10 +193974,10 @@ async def index_netapp_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNetAppPaginatePagination]: - """Return vulnerability data stored in index \"netapp\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNECPaginatePagination]: + """Return vulnerability data stored in index \"nec\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netapp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NetApp Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netapp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netapp?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nec index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NEC Security Information Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nec?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nec?cursor=` :param page: set the page number of the response :type page: int @@ -194049,7 +194049,7 @@ async def index_netapp_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_netapp_get_serialize( + _param = self._index_nec_get_serialize( page=page, limit=limit, cursor=cursor, @@ -194081,7 +194081,7 @@ async def index_netapp_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNetAppPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNECPaginatePagination", '404': "str", '500': "str", } @@ -194097,7 +194097,7 @@ async def index_netapp_get_with_http_info( @validate_call - async def index_netapp_get_without_preload_content( + async def index_nec_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -194136,9 +194136,9 @@ async def index_netapp_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"netapp\" + """Return vulnerability data stored in index \"nec\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netapp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NetApp Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netapp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netapp?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nec index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NEC Security Information Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nec?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nec?cursor=` :param page: set the page number of the response :type page: int @@ -194210,7 +194210,7 @@ async def index_netapp_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_netapp_get_serialize( + _param = self._index_nec_get_serialize( page=page, limit=limit, cursor=cursor, @@ -194242,7 +194242,7 @@ async def index_netapp_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNetAppPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNECPaginatePagination", '404': "str", '500': "str", } @@ -194253,7 +194253,7 @@ async def index_netapp_get_without_preload_content( return response_data.response - def _index_netapp_get_serialize( + def _index_nec_get_serialize( self, page, limit, @@ -194421,7 +194421,7 @@ def _index_netapp_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/netapp', + resource_path='/v3/index/nec', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -194438,7 +194438,7 @@ def _index_netapp_get_serialize( @validate_call - async def index_netatalk_get( + async def index_nessus_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -194476,10 +194476,10 @@ async def index_netatalk_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNetatalkPaginatePagination: - """Return vulnerability data stored in index \"netatalk\" + ) -> RenderResponseWithMetadataArrayAdvisoryNessusPaginatePagination: + """Return vulnerability data stored in index \"nessus\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netatalk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netatalk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netatalk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netatalk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nessus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nessus Plugins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nessus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nessus?cursor=` :param page: set the page number of the response :type page: int @@ -194551,7 +194551,7 @@ async def index_netatalk_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_netatalk_get_serialize( + _param = self._index_nessus_get_serialize( page=page, limit=limit, cursor=cursor, @@ -194583,7 +194583,7 @@ async def index_netatalk_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNetatalkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNessusPaginatePagination", '404': "str", '500': "str", } @@ -194599,7 +194599,7 @@ async def index_netatalk_get( @validate_call - async def index_netatalk_get_with_http_info( + async def index_nessus_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -194637,10 +194637,10 @@ async def index_netatalk_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNetatalkPaginatePagination]: - """Return vulnerability data stored in index \"netatalk\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNessusPaginatePagination]: + """Return vulnerability data stored in index \"nessus\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netatalk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netatalk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netatalk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netatalk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nessus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nessus Plugins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nessus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nessus?cursor=` :param page: set the page number of the response :type page: int @@ -194712,7 +194712,7 @@ async def index_netatalk_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_netatalk_get_serialize( + _param = self._index_nessus_get_serialize( page=page, limit=limit, cursor=cursor, @@ -194744,7 +194744,7 @@ async def index_netatalk_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNetatalkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNessusPaginatePagination", '404': "str", '500': "str", } @@ -194760,7 +194760,7 @@ async def index_netatalk_get_with_http_info( @validate_call - async def index_netatalk_get_without_preload_content( + async def index_nessus_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -194799,9 +194799,9 @@ async def index_netatalk_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"netatalk\" + """Return vulnerability data stored in index \"nessus\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netatalk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netatalk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netatalk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netatalk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nessus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nessus Plugins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nessus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nessus?cursor=` :param page: set the page number of the response :type page: int @@ -194873,7 +194873,7 @@ async def index_netatalk_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_netatalk_get_serialize( + _param = self._index_nessus_get_serialize( page=page, limit=limit, cursor=cursor, @@ -194905,7 +194905,7 @@ async def index_netatalk_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNetatalkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNessusPaginatePagination", '404': "str", '500': "str", } @@ -194916,7 +194916,7 @@ async def index_netatalk_get_without_preload_content( return response_data.response - def _index_netatalk_get_serialize( + def _index_nessus_get_serialize( self, page, limit, @@ -195084,7 +195084,7 @@ def _index_netatalk_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/netatalk', + resource_path='/v3/index/nessus', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -195101,7 +195101,7 @@ def _index_netatalk_get_serialize( @validate_call - async def index_netgate_get( + async def index_netapp_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -195139,10 +195139,10 @@ async def index_netgate_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNetgatePaginatePagination: - """Return vulnerability data stored in index \"netgate\" + ) -> RenderResponseWithMetadataArrayAdvisoryNetAppPaginatePagination: + """Return vulnerability data stored in index \"netapp\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netgate index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netgate Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netgate?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netgate?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netapp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NetApp Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netapp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netapp?cursor=` :param page: set the page number of the response :type page: int @@ -195214,7 +195214,7 @@ async def index_netgate_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_netgate_get_serialize( + _param = self._index_netapp_get_serialize( page=page, limit=limit, cursor=cursor, @@ -195246,7 +195246,7 @@ async def index_netgate_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNetgatePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNetAppPaginatePagination", '404': "str", '500': "str", } @@ -195262,7 +195262,7 @@ async def index_netgate_get( @validate_call - async def index_netgate_get_with_http_info( + async def index_netapp_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -195300,10 +195300,10 @@ async def index_netgate_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNetgatePaginatePagination]: - """Return vulnerability data stored in index \"netgate\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNetAppPaginatePagination]: + """Return vulnerability data stored in index \"netapp\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netgate index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netgate Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netgate?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netgate?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netapp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NetApp Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netapp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netapp?cursor=` :param page: set the page number of the response :type page: int @@ -195375,7 +195375,7 @@ async def index_netgate_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_netgate_get_serialize( + _param = self._index_netapp_get_serialize( page=page, limit=limit, cursor=cursor, @@ -195407,7 +195407,7 @@ async def index_netgate_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNetgatePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNetAppPaginatePagination", '404': "str", '500': "str", } @@ -195423,7 +195423,7 @@ async def index_netgate_get_with_http_info( @validate_call - async def index_netgate_get_without_preload_content( + async def index_netapp_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -195462,9 +195462,9 @@ async def index_netgate_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"netgate\" + """Return vulnerability data stored in index \"netapp\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netgate index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netgate Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netgate?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netgate?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netapp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NetApp Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netapp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netapp?cursor=` :param page: set the page number of the response :type page: int @@ -195536,7 +195536,7 @@ async def index_netgate_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_netgate_get_serialize( + _param = self._index_netapp_get_serialize( page=page, limit=limit, cursor=cursor, @@ -195568,7 +195568,7 @@ async def index_netgate_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNetgatePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNetAppPaginatePagination", '404': "str", '500': "str", } @@ -195579,7 +195579,7 @@ async def index_netgate_get_without_preload_content( return response_data.response - def _index_netgate_get_serialize( + def _index_netapp_get_serialize( self, page, limit, @@ -195747,7 +195747,7 @@ def _index_netgate_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/netgate', + resource_path='/v3/index/netapp', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -195764,7 +195764,7 @@ def _index_netgate_get_serialize( @validate_call - async def index_netgear_get( + async def index_netatalk_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -195802,10 +195802,10 @@ async def index_netgear_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNetgearPaginatePagination: - """Return vulnerability data stored in index \"netgear\" + ) -> RenderResponseWithMetadataArrayAdvisoryNetatalkPaginatePagination: + """Return vulnerability data stored in index \"netatalk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netgear index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NETGEAR Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netgear?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netgear?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netatalk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netatalk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netatalk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netatalk?cursor=` :param page: set the page number of the response :type page: int @@ -195877,7 +195877,7 @@ async def index_netgear_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_netgear_get_serialize( + _param = self._index_netatalk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -195909,7 +195909,7 @@ async def index_netgear_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNetgearPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNetatalkPaginatePagination", '404': "str", '500': "str", } @@ -195925,7 +195925,7 @@ async def index_netgear_get( @validate_call - async def index_netgear_get_with_http_info( + async def index_netatalk_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -195963,10 +195963,10 @@ async def index_netgear_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNetgearPaginatePagination]: - """Return vulnerability data stored in index \"netgear\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNetatalkPaginatePagination]: + """Return vulnerability data stored in index \"netatalk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netgear index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NETGEAR Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netgear?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netgear?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netatalk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netatalk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netatalk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netatalk?cursor=` :param page: set the page number of the response :type page: int @@ -196038,7 +196038,7 @@ async def index_netgear_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_netgear_get_serialize( + _param = self._index_netatalk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -196070,7 +196070,7 @@ async def index_netgear_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNetgearPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNetatalkPaginatePagination", '404': "str", '500': "str", } @@ -196086,7 +196086,7 @@ async def index_netgear_get_with_http_info( @validate_call - async def index_netgear_get_without_preload_content( + async def index_netatalk_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -196125,9 +196125,9 @@ async def index_netgear_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"netgear\" + """Return vulnerability data stored in index \"netatalk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netgear index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NETGEAR Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netgear?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netgear?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netatalk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netatalk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netatalk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netatalk?cursor=` :param page: set the page number of the response :type page: int @@ -196199,7 +196199,7 @@ async def index_netgear_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_netgear_get_serialize( + _param = self._index_netatalk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -196231,7 +196231,7 @@ async def index_netgear_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNetgearPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNetatalkPaginatePagination", '404': "str", '500': "str", } @@ -196242,7 +196242,7 @@ async def index_netgear_get_without_preload_content( return response_data.response - def _index_netgear_get_serialize( + def _index_netatalk_get_serialize( self, page, limit, @@ -196410,7 +196410,7 @@ def _index_netgear_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/netgear', + resource_path='/v3/index/netatalk', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -196427,7 +196427,7 @@ def _index_netgear_get_serialize( @validate_call - async def index_netskope_get( + async def index_netgate_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -196465,10 +196465,10 @@ async def index_netskope_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNetskopePaginatePagination: - """Return vulnerability data stored in index \"netskope\" + ) -> RenderResponseWithMetadataArrayAdvisoryNetgatePaginatePagination: + """Return vulnerability data stored in index \"netgate\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netskope index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netskope Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netskope?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netskope?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netgate index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netgate Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netgate?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netgate?cursor=` :param page: set the page number of the response :type page: int @@ -196540,7 +196540,7 @@ async def index_netskope_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_netskope_get_serialize( + _param = self._index_netgate_get_serialize( page=page, limit=limit, cursor=cursor, @@ -196572,7 +196572,7 @@ async def index_netskope_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNetskopePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNetgatePaginatePagination", '404': "str", '500': "str", } @@ -196588,7 +196588,7 @@ async def index_netskope_get( @validate_call - async def index_netskope_get_with_http_info( + async def index_netgate_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -196626,10 +196626,10 @@ async def index_netskope_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNetskopePaginatePagination]: - """Return vulnerability data stored in index \"netskope\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNetgatePaginatePagination]: + """Return vulnerability data stored in index \"netgate\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netskope index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netskope Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netskope?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netskope?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netgate index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netgate Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netgate?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netgate?cursor=` :param page: set the page number of the response :type page: int @@ -196701,7 +196701,7 @@ async def index_netskope_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_netskope_get_serialize( + _param = self._index_netgate_get_serialize( page=page, limit=limit, cursor=cursor, @@ -196733,7 +196733,7 @@ async def index_netskope_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNetskopePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNetgatePaginatePagination", '404': "str", '500': "str", } @@ -196749,7 +196749,7 @@ async def index_netskope_get_with_http_info( @validate_call - async def index_netskope_get_without_preload_content( + async def index_netgate_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -196788,9 +196788,9 @@ async def index_netskope_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"netskope\" + """Return vulnerability data stored in index \"netgate\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netskope index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netskope Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netskope?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netskope?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netgate index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netgate Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netgate?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netgate?cursor=` :param page: set the page number of the response :type page: int @@ -196862,7 +196862,7 @@ async def index_netskope_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_netskope_get_serialize( + _param = self._index_netgate_get_serialize( page=page, limit=limit, cursor=cursor, @@ -196894,7 +196894,7 @@ async def index_netskope_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNetskopePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNetgatePaginatePagination", '404': "str", '500': "str", } @@ -196905,7 +196905,7 @@ async def index_netskope_get_without_preload_content( return response_data.response - def _index_netskope_get_serialize( + def _index_netgate_get_serialize( self, page, limit, @@ -197073,7 +197073,7 @@ def _index_netskope_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/netskope', + resource_path='/v3/index/netgate', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -197090,7 +197090,7 @@ def _index_netskope_get_serialize( @validate_call - async def index_nexpose_get( + async def index_netgear_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -197128,10 +197128,10 @@ async def index_nexpose_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNexposePaginatePagination: - """Return vulnerability data stored in index \"nexpose\" + ) -> RenderResponseWithMetadataArrayAdvisoryNetgearPaginatePagination: + """Return vulnerability data stored in index \"netgear\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nexpose index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nexpose Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nexpose?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nexpose?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netgear index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NETGEAR Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netgear?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netgear?cursor=` :param page: set the page number of the response :type page: int @@ -197203,7 +197203,7 @@ async def index_nexpose_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nexpose_get_serialize( + _param = self._index_netgear_get_serialize( page=page, limit=limit, cursor=cursor, @@ -197235,7 +197235,7 @@ async def index_nexpose_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNexposePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNetgearPaginatePagination", '404': "str", '500': "str", } @@ -197251,7 +197251,7 @@ async def index_nexpose_get( @validate_call - async def index_nexpose_get_with_http_info( + async def index_netgear_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -197289,10 +197289,10 @@ async def index_nexpose_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNexposePaginatePagination]: - """Return vulnerability data stored in index \"nexpose\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNetgearPaginatePagination]: + """Return vulnerability data stored in index \"netgear\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nexpose index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nexpose Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nexpose?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nexpose?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netgear index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NETGEAR Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netgear?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netgear?cursor=` :param page: set the page number of the response :type page: int @@ -197364,7 +197364,7 @@ async def index_nexpose_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nexpose_get_serialize( + _param = self._index_netgear_get_serialize( page=page, limit=limit, cursor=cursor, @@ -197396,7 +197396,7 @@ async def index_nexpose_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNexposePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNetgearPaginatePagination", '404': "str", '500': "str", } @@ -197412,7 +197412,7 @@ async def index_nexpose_get_with_http_info( @validate_call - async def index_nexpose_get_without_preload_content( + async def index_netgear_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -197451,9 +197451,9 @@ async def index_nexpose_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"nexpose\" + """Return vulnerability data stored in index \"netgear\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nexpose index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nexpose Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nexpose?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nexpose?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netgear index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NETGEAR Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netgear?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netgear?cursor=` :param page: set the page number of the response :type page: int @@ -197525,7 +197525,7 @@ async def index_nexpose_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nexpose_get_serialize( + _param = self._index_netgear_get_serialize( page=page, limit=limit, cursor=cursor, @@ -197557,7 +197557,7 @@ async def index_nexpose_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNexposePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNetgearPaginatePagination", '404': "str", '500': "str", } @@ -197568,7 +197568,7 @@ async def index_nexpose_get_without_preload_content( return response_data.response - def _index_nexpose_get_serialize( + def _index_netgear_get_serialize( self, page, limit, @@ -197736,7 +197736,7 @@ def _index_nexpose_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/nexpose', + resource_path='/v3/index/netgear', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -197753,7 +197753,7 @@ def _index_nexpose_get_serialize( @validate_call - async def index_nginx_get( + async def index_netskope_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -197791,10 +197791,10 @@ async def index_nginx_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNginxAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"nginx\" + ) -> RenderResponseWithMetadataArrayAdvisoryNetskopePaginatePagination: + """Return vulnerability data stored in index \"netskope\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nginx index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nginx Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nginx?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nginx?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netskope index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netskope Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netskope?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netskope?cursor=` :param page: set the page number of the response :type page: int @@ -197866,7 +197866,7 @@ async def index_nginx_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nginx_get_serialize( + _param = self._index_netskope_get_serialize( page=page, limit=limit, cursor=cursor, @@ -197898,7 +197898,7 @@ async def index_nginx_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNginxAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNetskopePaginatePagination", '404': "str", '500': "str", } @@ -197914,7 +197914,7 @@ async def index_nginx_get( @validate_call - async def index_nginx_get_with_http_info( + async def index_netskope_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -197952,10 +197952,10 @@ async def index_nginx_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNginxAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"nginx\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNetskopePaginatePagination]: + """Return vulnerability data stored in index \"netskope\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nginx index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nginx Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nginx?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nginx?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netskope index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netskope Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netskope?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netskope?cursor=` :param page: set the page number of the response :type page: int @@ -198027,7 +198027,7 @@ async def index_nginx_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nginx_get_serialize( + _param = self._index_netskope_get_serialize( page=page, limit=limit, cursor=cursor, @@ -198059,7 +198059,7 @@ async def index_nginx_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNginxAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNetskopePaginatePagination", '404': "str", '500': "str", } @@ -198075,7 +198075,7 @@ async def index_nginx_get_with_http_info( @validate_call - async def index_nginx_get_without_preload_content( + async def index_netskope_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -198114,9 +198114,9 @@ async def index_nginx_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"nginx\" + """Return vulnerability data stored in index \"netskope\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nginx index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nginx Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nginx?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nginx?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netskope index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netskope Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netskope?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netskope?cursor=` :param page: set the page number of the response :type page: int @@ -198188,7 +198188,7 @@ async def index_nginx_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nginx_get_serialize( + _param = self._index_netskope_get_serialize( page=page, limit=limit, cursor=cursor, @@ -198220,7 +198220,7 @@ async def index_nginx_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNginxAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNetskopePaginatePagination", '404': "str", '500': "str", } @@ -198231,7 +198231,7 @@ async def index_nginx_get_without_preload_content( return response_data.response - def _index_nginx_get_serialize( + def _index_netskope_get_serialize( self, page, limit, @@ -198399,7 +198399,7 @@ def _index_nginx_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/nginx', + resource_path='/v3/index/netskope', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -198416,7 +198416,7 @@ def _index_nginx_get_serialize( @validate_call - async def index_nhs_get( + async def index_nexpose_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -198454,10 +198454,10 @@ async def index_nhs_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNHSPaginatePagination: - """Return vulnerability data stored in index \"nhs\" + ) -> RenderResponseWithMetadataArrayAdvisoryNexposePaginatePagination: + """Return vulnerability data stored in index \"nexpose\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nhs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NHS Cyber Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nhs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nhs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nexpose index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nexpose Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nexpose?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nexpose?cursor=` :param page: set the page number of the response :type page: int @@ -198529,7 +198529,7 @@ async def index_nhs_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nhs_get_serialize( + _param = self._index_nexpose_get_serialize( page=page, limit=limit, cursor=cursor, @@ -198561,7 +198561,7 @@ async def index_nhs_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNHSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNexposePaginatePagination", '404': "str", '500': "str", } @@ -198577,7 +198577,7 @@ async def index_nhs_get( @validate_call - async def index_nhs_get_with_http_info( + async def index_nexpose_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -198615,10 +198615,10 @@ async def index_nhs_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNHSPaginatePagination]: - """Return vulnerability data stored in index \"nhs\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNexposePaginatePagination]: + """Return vulnerability data stored in index \"nexpose\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nhs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NHS Cyber Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nhs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nhs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nexpose index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nexpose Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nexpose?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nexpose?cursor=` :param page: set the page number of the response :type page: int @@ -198690,7 +198690,7 @@ async def index_nhs_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nhs_get_serialize( + _param = self._index_nexpose_get_serialize( page=page, limit=limit, cursor=cursor, @@ -198722,7 +198722,7 @@ async def index_nhs_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNHSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNexposePaginatePagination", '404': "str", '500': "str", } @@ -198738,7 +198738,7 @@ async def index_nhs_get_with_http_info( @validate_call - async def index_nhs_get_without_preload_content( + async def index_nexpose_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -198777,9 +198777,9 @@ async def index_nhs_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"nhs\" + """Return vulnerability data stored in index \"nexpose\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nhs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NHS Cyber Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nhs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nhs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nexpose index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nexpose Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nexpose?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nexpose?cursor=` :param page: set the page number of the response :type page: int @@ -198851,7 +198851,7 @@ async def index_nhs_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nhs_get_serialize( + _param = self._index_nexpose_get_serialize( page=page, limit=limit, cursor=cursor, @@ -198883,7 +198883,7 @@ async def index_nhs_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNHSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNexposePaginatePagination", '404': "str", '500': "str", } @@ -198894,7 +198894,7 @@ async def index_nhs_get_without_preload_content( return response_data.response - def _index_nhs_get_serialize( + def _index_nexpose_get_serialize( self, page, limit, @@ -199062,7 +199062,7 @@ def _index_nhs_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/nhs', + resource_path='/v3/index/nexpose', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -199079,7 +199079,7 @@ def _index_nhs_get_serialize( @validate_call - async def index_ni_get( + async def index_nginx_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -199117,10 +199117,10 @@ async def index_ni_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNIPaginatePagination: - """Return vulnerability data stored in index \"ni\" + ) -> RenderResponseWithMetadataArrayAdvisoryNginxAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"nginx\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ni index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** National Instruments Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ni?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ni?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nginx index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nginx Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nginx?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nginx?cursor=` :param page: set the page number of the response :type page: int @@ -199192,7 +199192,7 @@ async def index_ni_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ni_get_serialize( + _param = self._index_nginx_get_serialize( page=page, limit=limit, cursor=cursor, @@ -199224,7 +199224,7 @@ async def index_ni_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNIPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNginxAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -199240,7 +199240,7 @@ async def index_ni_get( @validate_call - async def index_ni_get_with_http_info( + async def index_nginx_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -199278,10 +199278,10 @@ async def index_ni_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNIPaginatePagination]: - """Return vulnerability data stored in index \"ni\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNginxAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"nginx\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ni index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** National Instruments Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ni?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ni?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nginx index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nginx Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nginx?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nginx?cursor=` :param page: set the page number of the response :type page: int @@ -199353,7 +199353,7 @@ async def index_ni_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ni_get_serialize( + _param = self._index_nginx_get_serialize( page=page, limit=limit, cursor=cursor, @@ -199385,7 +199385,7 @@ async def index_ni_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNIPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNginxAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -199401,7 +199401,7 @@ async def index_ni_get_with_http_info( @validate_call - async def index_ni_get_without_preload_content( + async def index_nginx_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -199440,9 +199440,9 @@ async def index_ni_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ni\" + """Return vulnerability data stored in index \"nginx\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ni index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** National Instruments Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ni?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ni?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nginx index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nginx Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nginx?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nginx?cursor=` :param page: set the page number of the response :type page: int @@ -199514,7 +199514,7 @@ async def index_ni_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ni_get_serialize( + _param = self._index_nginx_get_serialize( page=page, limit=limit, cursor=cursor, @@ -199546,7 +199546,7 @@ async def index_ni_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNIPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNginxAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -199557,7 +199557,7 @@ async def index_ni_get_without_preload_content( return response_data.response - def _index_ni_get_serialize( + def _index_nginx_get_serialize( self, page, limit, @@ -199725,7 +199725,7 @@ def _index_ni_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ni', + resource_path='/v3/index/nginx', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -199742,7 +199742,7 @@ def _index_ni_get_serialize( @validate_call - async def index_nist_nvd2_cpematch_get( + async def index_nhs_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -199780,10 +199780,10 @@ async def index_nist_nvd2_cpematch_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiNVD20CPEMatchPaginatePagination: - """Return vulnerability data stored in index \"nist-nvd2-cpematch\" + ) -> RenderResponseWithMetadataArrayAdvisoryNHSPaginatePagination: + """Return vulnerability data stored in index \"nhs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-cpematch index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 CPE Match ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-cpematch?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2-cpematch?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nhs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NHS Cyber Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nhs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nhs?cursor=` :param page: set the page number of the response :type page: int @@ -199855,7 +199855,7 @@ async def index_nist_nvd2_cpematch_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nist_nvd2_cpematch_get_serialize( + _param = self._index_nhs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -199887,7 +199887,7 @@ async def index_nist_nvd2_cpematch_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiNVD20CPEMatchPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNHSPaginatePagination", '404': "str", '500': "str", } @@ -199903,7 +199903,7 @@ async def index_nist_nvd2_cpematch_get( @validate_call - async def index_nist_nvd2_cpematch_get_with_http_info( + async def index_nhs_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -199941,10 +199941,10 @@ async def index_nist_nvd2_cpematch_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiNVD20CPEMatchPaginatePagination]: - """Return vulnerability data stored in index \"nist-nvd2-cpematch\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNHSPaginatePagination]: + """Return vulnerability data stored in index \"nhs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-cpematch index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 CPE Match ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-cpematch?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2-cpematch?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nhs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NHS Cyber Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nhs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nhs?cursor=` :param page: set the page number of the response :type page: int @@ -200016,7 +200016,7 @@ async def index_nist_nvd2_cpematch_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nist_nvd2_cpematch_get_serialize( + _param = self._index_nhs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -200048,7 +200048,7 @@ async def index_nist_nvd2_cpematch_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiNVD20CPEMatchPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNHSPaginatePagination", '404': "str", '500': "str", } @@ -200064,7 +200064,7 @@ async def index_nist_nvd2_cpematch_get_with_http_info( @validate_call - async def index_nist_nvd2_cpematch_get_without_preload_content( + async def index_nhs_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -200103,9 +200103,9 @@ async def index_nist_nvd2_cpematch_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"nist-nvd2-cpematch\" + """Return vulnerability data stored in index \"nhs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-cpematch index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 CPE Match ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-cpematch?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2-cpematch?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nhs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NHS Cyber Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nhs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nhs?cursor=` :param page: set the page number of the response :type page: int @@ -200177,7 +200177,7 @@ async def index_nist_nvd2_cpematch_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nist_nvd2_cpematch_get_serialize( + _param = self._index_nhs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -200209,7 +200209,7 @@ async def index_nist_nvd2_cpematch_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiNVD20CPEMatchPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNHSPaginatePagination", '404': "str", '500': "str", } @@ -200220,7 +200220,7 @@ async def index_nist_nvd2_cpematch_get_without_preload_content( return response_data.response - def _index_nist_nvd2_cpematch_get_serialize( + def _index_nhs_get_serialize( self, page, limit, @@ -200388,7 +200388,7 @@ def _index_nist_nvd2_cpematch_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/nist-nvd2-cpematch', + resource_path='/v3/index/nhs', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -200405,7 +200405,7 @@ def _index_nist_nvd2_cpematch_get_serialize( @validate_call - async def index_nist_nvd2_get( + async def index_ni_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -200443,10 +200443,10 @@ async def index_nist_nvd2_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiNVD20CVEPaginatePagination: - """Return vulnerability data stored in index \"nist-nvd2\" + ) -> RenderResponseWithMetadataArrayAdvisoryNIPaginatePagination: + """Return vulnerability data stored in index \"ni\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ni index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** National Instruments Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ni?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ni?cursor=` :param page: set the page number of the response :type page: int @@ -200518,7 +200518,7 @@ async def index_nist_nvd2_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nist_nvd2_get_serialize( + _param = self._index_ni_get_serialize( page=page, limit=limit, cursor=cursor, @@ -200550,7 +200550,7 @@ async def index_nist_nvd2_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiNVD20CVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNIPaginatePagination", '404': "str", '500': "str", } @@ -200566,7 +200566,7 @@ async def index_nist_nvd2_get( @validate_call - async def index_nist_nvd2_get_with_http_info( + async def index_ni_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -200604,10 +200604,10 @@ async def index_nist_nvd2_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiNVD20CVEPaginatePagination]: - """Return vulnerability data stored in index \"nist-nvd2\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNIPaginatePagination]: + """Return vulnerability data stored in index \"ni\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ni index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** National Instruments Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ni?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ni?cursor=` :param page: set the page number of the response :type page: int @@ -200679,7 +200679,7 @@ async def index_nist_nvd2_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nist_nvd2_get_serialize( + _param = self._index_ni_get_serialize( page=page, limit=limit, cursor=cursor, @@ -200711,7 +200711,7 @@ async def index_nist_nvd2_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiNVD20CVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNIPaginatePagination", '404': "str", '500': "str", } @@ -200727,7 +200727,7 @@ async def index_nist_nvd2_get_with_http_info( @validate_call - async def index_nist_nvd2_get_without_preload_content( + async def index_ni_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -200766,9 +200766,9 @@ async def index_nist_nvd2_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"nist-nvd2\" + """Return vulnerability data stored in index \"ni\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ni index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** National Instruments Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ni?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ni?cursor=` :param page: set the page number of the response :type page: int @@ -200840,7 +200840,7 @@ async def index_nist_nvd2_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nist_nvd2_get_serialize( + _param = self._index_ni_get_serialize( page=page, limit=limit, cursor=cursor, @@ -200872,7 +200872,7 @@ async def index_nist_nvd2_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiNVD20CVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNIPaginatePagination", '404': "str", '500': "str", } @@ -200883,7 +200883,7 @@ async def index_nist_nvd2_get_without_preload_content( return response_data.response - def _index_nist_nvd2_get_serialize( + def _index_ni_get_serialize( self, page, limit, @@ -201051,7 +201051,7 @@ def _index_nist_nvd2_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/nist-nvd2', + resource_path='/v3/index/ni', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -201068,7 +201068,7 @@ def _index_nist_nvd2_get_serialize( @validate_call - async def index_nist_nvd2_sources_get( + async def index_nist_nvd2_cpematch_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -201106,10 +201106,10 @@ async def index_nist_nvd2_sources_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNVD20SourcePaginatePagination: - """Return vulnerability data stored in index \"nist-nvd2-sources\" + ) -> RenderResponseWithMetadataArrayApiNVD20CPEMatchPaginatePagination: + """Return vulnerability data stored in index \"nist-nvd2-cpematch\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-sources index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 Source Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-sources?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2-sources?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-cpematch index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 CPE Match ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-cpematch?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2-cpematch?cursor=` :param page: set the page number of the response :type page: int @@ -201181,7 +201181,7 @@ async def index_nist_nvd2_sources_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nist_nvd2_sources_get_serialize( + _param = self._index_nist_nvd2_cpematch_get_serialize( page=page, limit=limit, cursor=cursor, @@ -201213,7 +201213,7 @@ async def index_nist_nvd2_sources_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNVD20SourcePaginatePagination", + '200': "RenderResponseWithMetadataArrayApiNVD20CPEMatchPaginatePagination", '404': "str", '500': "str", } @@ -201229,7 +201229,7 @@ async def index_nist_nvd2_sources_get( @validate_call - async def index_nist_nvd2_sources_get_with_http_info( + async def index_nist_nvd2_cpematch_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -201267,10 +201267,10 @@ async def index_nist_nvd2_sources_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNVD20SourcePaginatePagination]: - """Return vulnerability data stored in index \"nist-nvd2-sources\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiNVD20CPEMatchPaginatePagination]: + """Return vulnerability data stored in index \"nist-nvd2-cpematch\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-sources index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 Source Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-sources?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2-sources?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-cpematch index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 CPE Match ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-cpematch?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2-cpematch?cursor=` :param page: set the page number of the response :type page: int @@ -201342,7 +201342,7 @@ async def index_nist_nvd2_sources_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nist_nvd2_sources_get_serialize( + _param = self._index_nist_nvd2_cpematch_get_serialize( page=page, limit=limit, cursor=cursor, @@ -201374,7 +201374,7 @@ async def index_nist_nvd2_sources_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNVD20SourcePaginatePagination", + '200': "RenderResponseWithMetadataArrayApiNVD20CPEMatchPaginatePagination", '404': "str", '500': "str", } @@ -201390,7 +201390,7 @@ async def index_nist_nvd2_sources_get_with_http_info( @validate_call - async def index_nist_nvd2_sources_get_without_preload_content( + async def index_nist_nvd2_cpematch_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -201429,9 +201429,9 @@ async def index_nist_nvd2_sources_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"nist-nvd2-sources\" + """Return vulnerability data stored in index \"nist-nvd2-cpematch\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-sources index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 Source Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-sources?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2-sources?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-cpematch index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 CPE Match ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-cpematch?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2-cpematch?cursor=` :param page: set the page number of the response :type page: int @@ -201503,7 +201503,7 @@ async def index_nist_nvd2_sources_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nist_nvd2_sources_get_serialize( + _param = self._index_nist_nvd2_cpematch_get_serialize( page=page, limit=limit, cursor=cursor, @@ -201535,7 +201535,7 @@ async def index_nist_nvd2_sources_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNVD20SourcePaginatePagination", + '200': "RenderResponseWithMetadataArrayApiNVD20CPEMatchPaginatePagination", '404': "str", '500': "str", } @@ -201546,7 +201546,7 @@ async def index_nist_nvd2_sources_get_without_preload_content( return response_data.response - def _index_nist_nvd2_sources_get_serialize( + def _index_nist_nvd2_cpematch_get_serialize( self, page, limit, @@ -201714,7 +201714,7 @@ def _index_nist_nvd2_sources_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/nist-nvd2-sources', + resource_path='/v3/index/nist-nvd2-cpematch', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -201731,7 +201731,7 @@ def _index_nist_nvd2_sources_get_serialize( @validate_call - async def index_nist_nvd_get( + async def index_nist_nvd2_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -201769,10 +201769,10 @@ async def index_nist_nvd_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiCveItemsPaginatePagination: - """Return vulnerability data stored in index \"nist-nvd\" + ) -> RenderResponseWithMetadataArrayApiNVD20CVEPaginatePagination: + """Return vulnerability data stored in index \"nist-nvd2\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 1.0 CVE data built from NIST NVD 2.0 CVE Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2?cursor=` :param page: set the page number of the response :type page: int @@ -201844,7 +201844,7 @@ async def index_nist_nvd_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nist_nvd_get_serialize( + _param = self._index_nist_nvd2_get_serialize( page=page, limit=limit, cursor=cursor, @@ -201876,7 +201876,7 @@ async def index_nist_nvd_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiCveItemsPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiNVD20CVEPaginatePagination", '404': "str", '500': "str", } @@ -201892,7 +201892,7 @@ async def index_nist_nvd_get( @validate_call - async def index_nist_nvd_get_with_http_info( + async def index_nist_nvd2_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -201930,10 +201930,10 @@ async def index_nist_nvd_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiCveItemsPaginatePagination]: - """Return vulnerability data stored in index \"nist-nvd\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiNVD20CVEPaginatePagination]: + """Return vulnerability data stored in index \"nist-nvd2\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 1.0 CVE data built from NIST NVD 2.0 CVE Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2?cursor=` :param page: set the page number of the response :type page: int @@ -202005,7 +202005,7 @@ async def index_nist_nvd_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nist_nvd_get_serialize( + _param = self._index_nist_nvd2_get_serialize( page=page, limit=limit, cursor=cursor, @@ -202037,7 +202037,7 @@ async def index_nist_nvd_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiCveItemsPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiNVD20CVEPaginatePagination", '404': "str", '500': "str", } @@ -202053,7 +202053,7 @@ async def index_nist_nvd_get_with_http_info( @validate_call - async def index_nist_nvd_get_without_preload_content( + async def index_nist_nvd2_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -202092,9 +202092,9 @@ async def index_nist_nvd_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"nist-nvd\" + """Return vulnerability data stored in index \"nist-nvd2\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 1.0 CVE data built from NIST NVD 2.0 CVE Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2?cursor=` :param page: set the page number of the response :type page: int @@ -202166,7 +202166,7 @@ async def index_nist_nvd_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nist_nvd_get_serialize( + _param = self._index_nist_nvd2_get_serialize( page=page, limit=limit, cursor=cursor, @@ -202198,7 +202198,7 @@ async def index_nist_nvd_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiCveItemsPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiNVD20CVEPaginatePagination", '404': "str", '500': "str", } @@ -202209,7 +202209,7 @@ async def index_nist_nvd_get_without_preload_content( return response_data.response - def _index_nist_nvd_get_serialize( + def _index_nist_nvd2_get_serialize( self, page, limit, @@ -202377,7 +202377,7 @@ def _index_nist_nvd_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/nist-nvd', + resource_path='/v3/index/nist-nvd2', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -202394,7 +202394,7 @@ def _index_nist_nvd_get_serialize( @validate_call - async def index_node_security_get( + async def index_nist_nvd2_sources_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -202432,10 +202432,10 @@ async def index_node_security_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNodeSecurityPaginatePagination: - """Return vulnerability data stored in index \"node-security\" + ) -> RenderResponseWithMetadataArrayAdvisoryNVD20SourcePaginatePagination: + """Return vulnerability data stored in index \"nist-nvd2-sources\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the node-security index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Node.js Security Working Group Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/node-security?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/node-security?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-sources index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 Source Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-sources?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2-sources?cursor=` :param page: set the page number of the response :type page: int @@ -202507,7 +202507,7 @@ async def index_node_security_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_node_security_get_serialize( + _param = self._index_nist_nvd2_sources_get_serialize( page=page, limit=limit, cursor=cursor, @@ -202539,7 +202539,7 @@ async def index_node_security_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNodeSecurityPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNVD20SourcePaginatePagination", '404': "str", '500': "str", } @@ -202555,7 +202555,7 @@ async def index_node_security_get( @validate_call - async def index_node_security_get_with_http_info( + async def index_nist_nvd2_sources_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -202593,10 +202593,10 @@ async def index_node_security_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNodeSecurityPaginatePagination]: - """Return vulnerability data stored in index \"node-security\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNVD20SourcePaginatePagination]: + """Return vulnerability data stored in index \"nist-nvd2-sources\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the node-security index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Node.js Security Working Group Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/node-security?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/node-security?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-sources index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 Source Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-sources?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2-sources?cursor=` :param page: set the page number of the response :type page: int @@ -202668,7 +202668,7 @@ async def index_node_security_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_node_security_get_serialize( + _param = self._index_nist_nvd2_sources_get_serialize( page=page, limit=limit, cursor=cursor, @@ -202700,7 +202700,7 @@ async def index_node_security_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNodeSecurityPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNVD20SourcePaginatePagination", '404': "str", '500': "str", } @@ -202716,7 +202716,7 @@ async def index_node_security_get_with_http_info( @validate_call - async def index_node_security_get_without_preload_content( + async def index_nist_nvd2_sources_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -202755,9 +202755,9 @@ async def index_node_security_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"node-security\" + """Return vulnerability data stored in index \"nist-nvd2-sources\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the node-security index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Node.js Security Working Group Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/node-security?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/node-security?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-sources index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 Source Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-sources?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2-sources?cursor=` :param page: set the page number of the response :type page: int @@ -202829,7 +202829,7 @@ async def index_node_security_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_node_security_get_serialize( + _param = self._index_nist_nvd2_sources_get_serialize( page=page, limit=limit, cursor=cursor, @@ -202861,7 +202861,7 @@ async def index_node_security_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNodeSecurityPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNVD20SourcePaginatePagination", '404': "str", '500': "str", } @@ -202872,7 +202872,7 @@ async def index_node_security_get_without_preload_content( return response_data.response - def _index_node_security_get_serialize( + def _index_nist_nvd2_sources_get_serialize( self, page, limit, @@ -203040,7 +203040,7 @@ def _index_node_security_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/node-security', + resource_path='/v3/index/nist-nvd2-sources', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -203057,7 +203057,7 @@ def _index_node_security_get_serialize( @validate_call - async def index_nodejs_get( + async def index_nist_nvd_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -203095,10 +203095,10 @@ async def index_nodejs_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNodeJSPaginatePagination: - """Return vulnerability data stored in index \"nodejs\" + ) -> RenderResponseWithMetadataArrayApiCveItemsPaginatePagination: + """Return vulnerability data stored in index \"nist-nvd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nodejs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NodeJS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nodejs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nodejs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 1.0 CVE data built from NIST NVD 2.0 CVE Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd?cursor=` :param page: set the page number of the response :type page: int @@ -203170,7 +203170,7 @@ async def index_nodejs_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nodejs_get_serialize( + _param = self._index_nist_nvd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -203202,7 +203202,7 @@ async def index_nodejs_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNodeJSPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiCveItemsPaginatePagination", '404': "str", '500': "str", } @@ -203218,7 +203218,7 @@ async def index_nodejs_get( @validate_call - async def index_nodejs_get_with_http_info( + async def index_nist_nvd_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -203256,10 +203256,10 @@ async def index_nodejs_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNodeJSPaginatePagination]: - """Return vulnerability data stored in index \"nodejs\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiCveItemsPaginatePagination]: + """Return vulnerability data stored in index \"nist-nvd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nodejs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NodeJS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nodejs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nodejs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 1.0 CVE data built from NIST NVD 2.0 CVE Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd?cursor=` :param page: set the page number of the response :type page: int @@ -203331,7 +203331,7 @@ async def index_nodejs_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nodejs_get_serialize( + _param = self._index_nist_nvd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -203363,7 +203363,7 @@ async def index_nodejs_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNodeJSPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiCveItemsPaginatePagination", '404': "str", '500': "str", } @@ -203379,7 +203379,7 @@ async def index_nodejs_get_with_http_info( @validate_call - async def index_nodejs_get_without_preload_content( + async def index_nist_nvd_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -203418,9 +203418,9 @@ async def index_nodejs_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"nodejs\" + """Return vulnerability data stored in index \"nist-nvd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nodejs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NodeJS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nodejs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nodejs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 1.0 CVE data built from NIST NVD 2.0 CVE Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd?cursor=` :param page: set the page number of the response :type page: int @@ -203492,7 +203492,7 @@ async def index_nodejs_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nodejs_get_serialize( + _param = self._index_nist_nvd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -203524,7 +203524,7 @@ async def index_nodejs_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNodeJSPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiCveItemsPaginatePagination", '404': "str", '500': "str", } @@ -203535,7 +203535,7 @@ async def index_nodejs_get_without_preload_content( return response_data.response - def _index_nodejs_get_serialize( + def _index_nist_nvd_get_serialize( self, page, limit, @@ -203703,7 +203703,7 @@ def _index_nodejs_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/nodejs', + resource_path='/v3/index/nist-nvd', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -203720,7 +203720,7 @@ def _index_nodejs_get_serialize( @validate_call - async def index_nokia_get( + async def index_node_security_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -203758,10 +203758,10 @@ async def index_nokia_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNokiaPaginatePagination: - """Return vulnerability data stored in index \"nokia\" + ) -> RenderResponseWithMetadataArrayAdvisoryNodeSecurityPaginatePagination: + """Return vulnerability data stored in index \"node-security\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nokia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nokia Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nokia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nokia?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the node-security index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Node.js Security Working Group Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/node-security?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/node-security?cursor=` :param page: set the page number of the response :type page: int @@ -203833,7 +203833,7 @@ async def index_nokia_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nokia_get_serialize( + _param = self._index_node_security_get_serialize( page=page, limit=limit, cursor=cursor, @@ -203865,7 +203865,7 @@ async def index_nokia_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNokiaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNodeSecurityPaginatePagination", '404': "str", '500': "str", } @@ -203881,7 +203881,7 @@ async def index_nokia_get( @validate_call - async def index_nokia_get_with_http_info( + async def index_node_security_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -203919,10 +203919,10 @@ async def index_nokia_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNokiaPaginatePagination]: - """Return vulnerability data stored in index \"nokia\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNodeSecurityPaginatePagination]: + """Return vulnerability data stored in index \"node-security\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nokia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nokia Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nokia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nokia?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the node-security index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Node.js Security Working Group Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/node-security?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/node-security?cursor=` :param page: set the page number of the response :type page: int @@ -203994,7 +203994,7 @@ async def index_nokia_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nokia_get_serialize( + _param = self._index_node_security_get_serialize( page=page, limit=limit, cursor=cursor, @@ -204026,7 +204026,7 @@ async def index_nokia_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNokiaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNodeSecurityPaginatePagination", '404': "str", '500': "str", } @@ -204042,7 +204042,7 @@ async def index_nokia_get_with_http_info( @validate_call - async def index_nokia_get_without_preload_content( + async def index_node_security_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -204081,9 +204081,9 @@ async def index_nokia_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"nokia\" + """Return vulnerability data stored in index \"node-security\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nokia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nokia Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nokia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nokia?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the node-security index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Node.js Security Working Group Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/node-security?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/node-security?cursor=` :param page: set the page number of the response :type page: int @@ -204155,7 +204155,7 @@ async def index_nokia_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nokia_get_serialize( + _param = self._index_node_security_get_serialize( page=page, limit=limit, cursor=cursor, @@ -204187,7 +204187,7 @@ async def index_nokia_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNokiaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNodeSecurityPaginatePagination", '404': "str", '500': "str", } @@ -204198,7 +204198,7 @@ async def index_nokia_get_without_preload_content( return response_data.response - def _index_nokia_get_serialize( + def _index_node_security_get_serialize( self, page, limit, @@ -204366,7 +204366,7 @@ def _index_nokia_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/nokia', + resource_path='/v3/index/node-security', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -204383,7 +204383,7 @@ def _index_nokia_get_serialize( @validate_call - async def index_notepadplusplus_get( + async def index_nodejs_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -204421,10 +204421,10 @@ async def index_notepadplusplus_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNotePadPlusPlusPaginatePagination: - """Return vulnerability data stored in index \"notepadplusplus\" + ) -> RenderResponseWithMetadataArrayAdvisoryNodeJSPaginatePagination: + """Return vulnerability data stored in index \"nodejs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the notepadplusplus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Notepad++ Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/notepadplusplus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/notepadplusplus?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nodejs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NodeJS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nodejs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nodejs?cursor=` :param page: set the page number of the response :type page: int @@ -204496,7 +204496,7 @@ async def index_notepadplusplus_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_notepadplusplus_get_serialize( + _param = self._index_nodejs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -204528,7 +204528,7 @@ async def index_notepadplusplus_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNotePadPlusPlusPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNodeJSPaginatePagination", '404': "str", '500': "str", } @@ -204544,7 +204544,7 @@ async def index_notepadplusplus_get( @validate_call - async def index_notepadplusplus_get_with_http_info( + async def index_nodejs_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -204582,10 +204582,10 @@ async def index_notepadplusplus_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNotePadPlusPlusPaginatePagination]: - """Return vulnerability data stored in index \"notepadplusplus\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNodeJSPaginatePagination]: + """Return vulnerability data stored in index \"nodejs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the notepadplusplus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Notepad++ Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/notepadplusplus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/notepadplusplus?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nodejs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NodeJS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nodejs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nodejs?cursor=` :param page: set the page number of the response :type page: int @@ -204657,7 +204657,7 @@ async def index_notepadplusplus_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_notepadplusplus_get_serialize( + _param = self._index_nodejs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -204689,7 +204689,7 @@ async def index_notepadplusplus_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNotePadPlusPlusPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNodeJSPaginatePagination", '404': "str", '500': "str", } @@ -204705,7 +204705,7 @@ async def index_notepadplusplus_get_with_http_info( @validate_call - async def index_notepadplusplus_get_without_preload_content( + async def index_nodejs_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -204744,9 +204744,9 @@ async def index_notepadplusplus_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"notepadplusplus\" + """Return vulnerability data stored in index \"nodejs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the notepadplusplus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Notepad++ Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/notepadplusplus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/notepadplusplus?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nodejs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NodeJS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nodejs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nodejs?cursor=` :param page: set the page number of the response :type page: int @@ -204818,7 +204818,7 @@ async def index_notepadplusplus_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_notepadplusplus_get_serialize( + _param = self._index_nodejs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -204850,7 +204850,7 @@ async def index_notepadplusplus_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNotePadPlusPlusPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNodeJSPaginatePagination", '404': "str", '500': "str", } @@ -204861,7 +204861,7 @@ async def index_notepadplusplus_get_without_preload_content( return response_data.response - def _index_notepadplusplus_get_serialize( + def _index_nodejs_get_serialize( self, page, limit, @@ -205029,7 +205029,7 @@ def _index_notepadplusplus_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/notepadplusplus', + resource_path='/v3/index/nodejs', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -205046,7 +205046,7 @@ def _index_notepadplusplus_get_serialize( @validate_call - async def index_nozomi_get( + async def index_nokia_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -205084,10 +205084,10 @@ async def index_nozomi_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNozomiPaginatePagination: - """Return vulnerability data stored in index \"nozomi\" + ) -> RenderResponseWithMetadataArrayAdvisoryNokiaPaginatePagination: + """Return vulnerability data stored in index \"nokia\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nozomi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nozomi Networks Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nozomi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nozomi?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nokia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nokia Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nokia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nokia?cursor=` :param page: set the page number of the response :type page: int @@ -205159,7 +205159,7 @@ async def index_nozomi_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nozomi_get_serialize( + _param = self._index_nokia_get_serialize( page=page, limit=limit, cursor=cursor, @@ -205191,7 +205191,7 @@ async def index_nozomi_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNozomiPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNokiaPaginatePagination", '404': "str", '500': "str", } @@ -205207,7 +205207,7 @@ async def index_nozomi_get( @validate_call - async def index_nozomi_get_with_http_info( + async def index_nokia_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -205245,10 +205245,10 @@ async def index_nozomi_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNozomiPaginatePagination]: - """Return vulnerability data stored in index \"nozomi\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNokiaPaginatePagination]: + """Return vulnerability data stored in index \"nokia\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nozomi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nozomi Networks Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nozomi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nozomi?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nokia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nokia Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nokia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nokia?cursor=` :param page: set the page number of the response :type page: int @@ -205320,7 +205320,7 @@ async def index_nozomi_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nozomi_get_serialize( + _param = self._index_nokia_get_serialize( page=page, limit=limit, cursor=cursor, @@ -205352,7 +205352,7 @@ async def index_nozomi_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNozomiPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNokiaPaginatePagination", '404': "str", '500': "str", } @@ -205368,7 +205368,7 @@ async def index_nozomi_get_with_http_info( @validate_call - async def index_nozomi_get_without_preload_content( + async def index_nokia_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -205407,9 +205407,9 @@ async def index_nozomi_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"nozomi\" + """Return vulnerability data stored in index \"nokia\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nozomi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nozomi Networks Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nozomi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nozomi?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nokia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nokia Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nokia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nokia?cursor=` :param page: set the page number of the response :type page: int @@ -205481,7 +205481,7 @@ async def index_nozomi_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nozomi_get_serialize( + _param = self._index_nokia_get_serialize( page=page, limit=limit, cursor=cursor, @@ -205513,7 +205513,7 @@ async def index_nozomi_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNozomiPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNokiaPaginatePagination", '404': "str", '500': "str", } @@ -205524,7 +205524,7 @@ async def index_nozomi_get_without_preload_content( return response_data.response - def _index_nozomi_get_serialize( + def _index_nokia_get_serialize( self, page, limit, @@ -205692,7 +205692,7 @@ def _index_nozomi_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/nozomi', + resource_path='/v3/index/nokia', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -205709,7 +205709,7 @@ def _index_nozomi_get_serialize( @validate_call - async def index_npm_get( + async def index_notepadplusplus_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -205747,10 +205747,10 @@ async def index_npm_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: - """Return vulnerability data stored in index \"npm\" + ) -> RenderResponseWithMetadataArrayAdvisoryNotePadPlusPlusPaginatePagination: + """Return vulnerability data stored in index \"notepadplusplus\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the npm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NPM (JS/TS) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/npm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/npm?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the notepadplusplus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Notepad++ Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/notepadplusplus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/notepadplusplus?cursor=` :param page: set the page number of the response :type page: int @@ -205822,7 +205822,7 @@ async def index_npm_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_npm_get_serialize( + _param = self._index_notepadplusplus_get_serialize( page=page, limit=limit, cursor=cursor, @@ -205854,7 +205854,7 @@ async def index_npm_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNotePadPlusPlusPaginatePagination", '404': "str", '500': "str", } @@ -205870,7 +205870,7 @@ async def index_npm_get( @validate_call - async def index_npm_get_with_http_info( + async def index_notepadplusplus_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -205908,10 +205908,10 @@ async def index_npm_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: - """Return vulnerability data stored in index \"npm\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNotePadPlusPlusPaginatePagination]: + """Return vulnerability data stored in index \"notepadplusplus\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the npm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NPM (JS/TS) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/npm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/npm?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the notepadplusplus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Notepad++ Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/notepadplusplus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/notepadplusplus?cursor=` :param page: set the page number of the response :type page: int @@ -205983,7 +205983,7 @@ async def index_npm_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_npm_get_serialize( + _param = self._index_notepadplusplus_get_serialize( page=page, limit=limit, cursor=cursor, @@ -206015,7 +206015,7 @@ async def index_npm_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNotePadPlusPlusPaginatePagination", '404': "str", '500': "str", } @@ -206031,7 +206031,7 @@ async def index_npm_get_with_http_info( @validate_call - async def index_npm_get_without_preload_content( + async def index_notepadplusplus_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -206070,9 +206070,9 @@ async def index_npm_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"npm\" + """Return vulnerability data stored in index \"notepadplusplus\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the npm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NPM (JS/TS) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/npm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/npm?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the notepadplusplus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Notepad++ Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/notepadplusplus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/notepadplusplus?cursor=` :param page: set the page number of the response :type page: int @@ -206144,7 +206144,7 @@ async def index_npm_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_npm_get_serialize( + _param = self._index_notepadplusplus_get_serialize( page=page, limit=limit, cursor=cursor, @@ -206176,7 +206176,7 @@ async def index_npm_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNotePadPlusPlusPaginatePagination", '404': "str", '500': "str", } @@ -206187,7 +206187,7 @@ async def index_npm_get_without_preload_content( return response_data.response - def _index_npm_get_serialize( + def _index_notepadplusplus_get_serialize( self, page, limit, @@ -206355,7 +206355,7 @@ def _index_npm_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/npm', + resource_path='/v3/index/notepadplusplus', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -206372,7 +206372,7 @@ def _index_npm_get_serialize( @validate_call - async def index_ntp_get( + async def index_nozomi_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -206410,10 +206410,10 @@ async def index_ntp_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNTPPaginatePagination: - """Return vulnerability data stored in index \"ntp\" + ) -> RenderResponseWithMetadataArrayAdvisoryNozomiPaginatePagination: + """Return vulnerability data stored in index \"nozomi\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ntp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NTP Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ntp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ntp?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nozomi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nozomi Networks Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nozomi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nozomi?cursor=` :param page: set the page number of the response :type page: int @@ -206485,7 +206485,7 @@ async def index_ntp_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ntp_get_serialize( + _param = self._index_nozomi_get_serialize( page=page, limit=limit, cursor=cursor, @@ -206517,7 +206517,7 @@ async def index_ntp_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNTPPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNozomiPaginatePagination", '404': "str", '500': "str", } @@ -206533,7 +206533,7 @@ async def index_ntp_get( @validate_call - async def index_ntp_get_with_http_info( + async def index_nozomi_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -206571,10 +206571,10 @@ async def index_ntp_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNTPPaginatePagination]: - """Return vulnerability data stored in index \"ntp\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNozomiPaginatePagination]: + """Return vulnerability data stored in index \"nozomi\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ntp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NTP Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ntp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ntp?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nozomi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nozomi Networks Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nozomi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nozomi?cursor=` :param page: set the page number of the response :type page: int @@ -206646,7 +206646,7 @@ async def index_ntp_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ntp_get_serialize( + _param = self._index_nozomi_get_serialize( page=page, limit=limit, cursor=cursor, @@ -206678,7 +206678,7 @@ async def index_ntp_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNTPPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNozomiPaginatePagination", '404': "str", '500': "str", } @@ -206694,7 +206694,7 @@ async def index_ntp_get_with_http_info( @validate_call - async def index_ntp_get_without_preload_content( + async def index_nozomi_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -206733,9 +206733,9 @@ async def index_ntp_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ntp\" + """Return vulnerability data stored in index \"nozomi\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ntp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NTP Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ntp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ntp?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nozomi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nozomi Networks Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nozomi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nozomi?cursor=` :param page: set the page number of the response :type page: int @@ -206807,7 +206807,7 @@ async def index_ntp_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ntp_get_serialize( + _param = self._index_nozomi_get_serialize( page=page, limit=limit, cursor=cursor, @@ -206839,7 +206839,7 @@ async def index_ntp_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNTPPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNozomiPaginatePagination", '404': "str", '500': "str", } @@ -206850,7 +206850,7 @@ async def index_ntp_get_without_preload_content( return response_data.response - def _index_ntp_get_serialize( + def _index_nozomi_get_serialize( self, page, limit, @@ -207018,7 +207018,7 @@ def _index_ntp_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ntp', + resource_path='/v3/index/nozomi', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -207035,7 +207035,7 @@ def _index_ntp_get_serialize( @validate_call - async def index_nuclei_get( + async def index_npm_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -207073,10 +207073,10 @@ async def index_nuclei_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNucleiPaginatePagination: - """Return vulnerability data stored in index \"nuclei\" + ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: + """Return vulnerability data stored in index \"npm\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nuclei index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nuclei Templates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nuclei?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nuclei?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the npm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NPM (JS/TS) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/npm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/npm?cursor=` :param page: set the page number of the response :type page: int @@ -207148,7 +207148,7 @@ async def index_nuclei_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nuclei_get_serialize( + _param = self._index_npm_get_serialize( page=page, limit=limit, cursor=cursor, @@ -207180,7 +207180,7 @@ async def index_nuclei_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNucleiPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -207196,7 +207196,7 @@ async def index_nuclei_get( @validate_call - async def index_nuclei_get_with_http_info( + async def index_npm_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -207234,10 +207234,10 @@ async def index_nuclei_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNucleiPaginatePagination]: - """Return vulnerability data stored in index \"nuclei\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: + """Return vulnerability data stored in index \"npm\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nuclei index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nuclei Templates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nuclei?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nuclei?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the npm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NPM (JS/TS) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/npm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/npm?cursor=` :param page: set the page number of the response :type page: int @@ -207309,7 +207309,7 @@ async def index_nuclei_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nuclei_get_serialize( + _param = self._index_npm_get_serialize( page=page, limit=limit, cursor=cursor, @@ -207341,7 +207341,7 @@ async def index_nuclei_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNucleiPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -207357,7 +207357,7 @@ async def index_nuclei_get_with_http_info( @validate_call - async def index_nuclei_get_without_preload_content( + async def index_npm_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -207396,9 +207396,9 @@ async def index_nuclei_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"nuclei\" + """Return vulnerability data stored in index \"npm\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nuclei index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nuclei Templates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nuclei?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nuclei?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the npm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NPM (JS/TS) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/npm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/npm?cursor=` :param page: set the page number of the response :type page: int @@ -207470,7 +207470,7 @@ async def index_nuclei_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nuclei_get_serialize( + _param = self._index_npm_get_serialize( page=page, limit=limit, cursor=cursor, @@ -207502,7 +207502,7 @@ async def index_nuclei_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNucleiPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -207513,7 +207513,7 @@ async def index_nuclei_get_without_preload_content( return response_data.response - def _index_nuclei_get_serialize( + def _index_npm_get_serialize( self, page, limit, @@ -207681,7 +207681,7 @@ def _index_nuclei_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/nuclei', + resource_path='/v3/index/npm', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -207698,7 +207698,7 @@ def _index_nuclei_get_serialize( @validate_call - async def index_nuget_get( + async def index_ntp_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -207736,10 +207736,10 @@ async def index_nuget_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: - """Return vulnerability data stored in index \"nuget\" + ) -> RenderResponseWithMetadataArrayAdvisoryNTPPaginatePagination: + """Return vulnerability data stored in index \"ntp\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nuget index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nuget (C#/F#) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nuget?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nuget?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ntp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NTP Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ntp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ntp?cursor=` :param page: set the page number of the response :type page: int @@ -207811,7 +207811,7 @@ async def index_nuget_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nuget_get_serialize( + _param = self._index_ntp_get_serialize( page=page, limit=limit, cursor=cursor, @@ -207843,7 +207843,7 @@ async def index_nuget_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNTPPaginatePagination", '404': "str", '500': "str", } @@ -207859,7 +207859,7 @@ async def index_nuget_get( @validate_call - async def index_nuget_get_with_http_info( + async def index_ntp_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -207897,10 +207897,10 @@ async def index_nuget_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: - """Return vulnerability data stored in index \"nuget\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNTPPaginatePagination]: + """Return vulnerability data stored in index \"ntp\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nuget index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nuget (C#/F#) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nuget?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nuget?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ntp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NTP Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ntp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ntp?cursor=` :param page: set the page number of the response :type page: int @@ -207972,7 +207972,7 @@ async def index_nuget_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nuget_get_serialize( + _param = self._index_ntp_get_serialize( page=page, limit=limit, cursor=cursor, @@ -208004,7 +208004,7 @@ async def index_nuget_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNTPPaginatePagination", '404': "str", '500': "str", } @@ -208020,7 +208020,7 @@ async def index_nuget_get_with_http_info( @validate_call - async def index_nuget_get_without_preload_content( + async def index_ntp_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -208059,9 +208059,9 @@ async def index_nuget_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"nuget\" + """Return vulnerability data stored in index \"ntp\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nuget index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nuget (C#/F#) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nuget?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nuget?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ntp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NTP Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ntp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ntp?cursor=` :param page: set the page number of the response :type page: int @@ -208133,7 +208133,7 @@ async def index_nuget_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nuget_get_serialize( + _param = self._index_ntp_get_serialize( page=page, limit=limit, cursor=cursor, @@ -208165,7 +208165,7 @@ async def index_nuget_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNTPPaginatePagination", '404': "str", '500': "str", } @@ -208176,7 +208176,7 @@ async def index_nuget_get_without_preload_content( return response_data.response - def _index_nuget_get_serialize( + def _index_ntp_get_serialize( self, page, limit, @@ -208344,7 +208344,7 @@ def _index_nuget_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/nuget', + resource_path='/v3/index/ntp', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -208361,7 +208361,7 @@ def _index_nuget_get_serialize( @validate_call - async def index_nvd_cpe_dictionary_get( + async def index_nuclei_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -208399,10 +208399,10 @@ async def index_nvd_cpe_dictionary_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNVDCPEDictionaryPaginatePagination: - """Return vulnerability data stored in index \"nvd-cpe-dictionary\" + ) -> RenderResponseWithMetadataArrayAdvisoryNucleiPaginatePagination: + """Return vulnerability data stored in index \"nuclei\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nvd-cpe-dictionary index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NVD's CPE Dictionary ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nvd-cpe-dictionary?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nvd-cpe-dictionary?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nuclei index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nuclei Templates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nuclei?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nuclei?cursor=` :param page: set the page number of the response :type page: int @@ -208474,7 +208474,7 @@ async def index_nvd_cpe_dictionary_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nvd_cpe_dictionary_get_serialize( + _param = self._index_nuclei_get_serialize( page=page, limit=limit, cursor=cursor, @@ -208506,7 +208506,7 @@ async def index_nvd_cpe_dictionary_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNVDCPEDictionaryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNucleiPaginatePagination", '404': "str", '500': "str", } @@ -208522,7 +208522,7 @@ async def index_nvd_cpe_dictionary_get( @validate_call - async def index_nvd_cpe_dictionary_get_with_http_info( + async def index_nuclei_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -208560,10 +208560,10 @@ async def index_nvd_cpe_dictionary_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNVDCPEDictionaryPaginatePagination]: - """Return vulnerability data stored in index \"nvd-cpe-dictionary\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNucleiPaginatePagination]: + """Return vulnerability data stored in index \"nuclei\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nvd-cpe-dictionary index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NVD's CPE Dictionary ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nvd-cpe-dictionary?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nvd-cpe-dictionary?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nuclei index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nuclei Templates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nuclei?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nuclei?cursor=` :param page: set the page number of the response :type page: int @@ -208635,7 +208635,7 @@ async def index_nvd_cpe_dictionary_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nvd_cpe_dictionary_get_serialize( + _param = self._index_nuclei_get_serialize( page=page, limit=limit, cursor=cursor, @@ -208667,7 +208667,7 @@ async def index_nvd_cpe_dictionary_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNVDCPEDictionaryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNucleiPaginatePagination", '404': "str", '500': "str", } @@ -208683,7 +208683,7 @@ async def index_nvd_cpe_dictionary_get_with_http_info( @validate_call - async def index_nvd_cpe_dictionary_get_without_preload_content( + async def index_nuclei_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -208722,9 +208722,9 @@ async def index_nvd_cpe_dictionary_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"nvd-cpe-dictionary\" + """Return vulnerability data stored in index \"nuclei\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nvd-cpe-dictionary index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NVD's CPE Dictionary ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nvd-cpe-dictionary?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nvd-cpe-dictionary?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nuclei index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nuclei Templates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nuclei?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nuclei?cursor=` :param page: set the page number of the response :type page: int @@ -208796,7 +208796,7 @@ async def index_nvd_cpe_dictionary_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nvd_cpe_dictionary_get_serialize( + _param = self._index_nuclei_get_serialize( page=page, limit=limit, cursor=cursor, @@ -208828,7 +208828,7 @@ async def index_nvd_cpe_dictionary_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNVDCPEDictionaryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNucleiPaginatePagination", '404': "str", '500': "str", } @@ -208839,7 +208839,7 @@ async def index_nvd_cpe_dictionary_get_without_preload_content( return response_data.response - def _index_nvd_cpe_dictionary_get_serialize( + def _index_nuclei_get_serialize( self, page, limit, @@ -209007,7 +209007,7 @@ def _index_nvd_cpe_dictionary_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/nvd-cpe-dictionary', + resource_path='/v3/index/nuclei', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -209024,7 +209024,7 @@ def _index_nvd_cpe_dictionary_get_serialize( @validate_call - async def index_nvidia_get( + async def index_nuget_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -209062,10 +209062,10 @@ async def index_nvidia_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySecurityBulletinPaginatePagination: - """Return vulnerability data stored in index \"nvidia\" + ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: + """Return vulnerability data stored in index \"nuget\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nvidia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NVIDIA Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nvidia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nvidia?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nuget index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nuget (C#/F#) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nuget?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nuget?cursor=` :param page: set the page number of the response :type page: int @@ -209137,7 +209137,7 @@ async def index_nvidia_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nvidia_get_serialize( + _param = self._index_nuget_get_serialize( page=page, limit=limit, cursor=cursor, @@ -209169,7 +209169,7 @@ async def index_nvidia_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySecurityBulletinPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -209185,7 +209185,7 @@ async def index_nvidia_get( @validate_call - async def index_nvidia_get_with_http_info( + async def index_nuget_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -209223,10 +209223,10 @@ async def index_nvidia_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySecurityBulletinPaginatePagination]: - """Return vulnerability data stored in index \"nvidia\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: + """Return vulnerability data stored in index \"nuget\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nvidia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NVIDIA Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nvidia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nvidia?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nuget index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nuget (C#/F#) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nuget?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nuget?cursor=` :param page: set the page number of the response :type page: int @@ -209298,7 +209298,7 @@ async def index_nvidia_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nvidia_get_serialize( + _param = self._index_nuget_get_serialize( page=page, limit=limit, cursor=cursor, @@ -209330,7 +209330,7 @@ async def index_nvidia_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySecurityBulletinPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -209346,7 +209346,7 @@ async def index_nvidia_get_with_http_info( @validate_call - async def index_nvidia_get_without_preload_content( + async def index_nuget_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -209385,9 +209385,9 @@ async def index_nvidia_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"nvidia\" + """Return vulnerability data stored in index \"nuget\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nvidia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NVIDIA Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nvidia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nvidia?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nuget index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nuget (C#/F#) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nuget?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nuget?cursor=` :param page: set the page number of the response :type page: int @@ -209459,7 +209459,7 @@ async def index_nvidia_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nvidia_get_serialize( + _param = self._index_nuget_get_serialize( page=page, limit=limit, cursor=cursor, @@ -209491,7 +209491,7 @@ async def index_nvidia_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySecurityBulletinPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -209502,7 +209502,7 @@ async def index_nvidia_get_without_preload_content( return response_data.response - def _index_nvidia_get_serialize( + def _index_nuget_get_serialize( self, page, limit, @@ -209670,7 +209670,7 @@ def _index_nvidia_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/nvidia', + resource_path='/v3/index/nuget', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -209687,7 +209687,7 @@ def _index_nvidia_get_serialize( @validate_call - async def index_nz_advisories_get( + async def index_nvd_cpe_dictionary_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -209725,10 +209725,10 @@ async def index_nz_advisories_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNZAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"nz-advisories\" + ) -> RenderResponseWithMetadataArrayAdvisoryNVDCPEDictionaryPaginatePagination: + """Return vulnerability data stored in index \"nvd-cpe-dictionary\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nz-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CERT NZ Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nz-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nz-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nvd-cpe-dictionary index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NVD's CPE Dictionary ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nvd-cpe-dictionary?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nvd-cpe-dictionary?cursor=` :param page: set the page number of the response :type page: int @@ -209800,7 +209800,7 @@ async def index_nz_advisories_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nz_advisories_get_serialize( + _param = self._index_nvd_cpe_dictionary_get_serialize( page=page, limit=limit, cursor=cursor, @@ -209832,7 +209832,7 @@ async def index_nz_advisories_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNZAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNVDCPEDictionaryPaginatePagination", '404': "str", '500': "str", } @@ -209848,7 +209848,7 @@ async def index_nz_advisories_get( @validate_call - async def index_nz_advisories_get_with_http_info( + async def index_nvd_cpe_dictionary_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -209886,10 +209886,10 @@ async def index_nz_advisories_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNZAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"nz-advisories\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNVDCPEDictionaryPaginatePagination]: + """Return vulnerability data stored in index \"nvd-cpe-dictionary\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nz-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CERT NZ Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nz-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nz-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nvd-cpe-dictionary index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NVD's CPE Dictionary ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nvd-cpe-dictionary?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nvd-cpe-dictionary?cursor=` :param page: set the page number of the response :type page: int @@ -209961,7 +209961,7 @@ async def index_nz_advisories_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nz_advisories_get_serialize( + _param = self._index_nvd_cpe_dictionary_get_serialize( page=page, limit=limit, cursor=cursor, @@ -209993,7 +209993,7 @@ async def index_nz_advisories_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNZAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNVDCPEDictionaryPaginatePagination", '404': "str", '500': "str", } @@ -210009,7 +210009,7 @@ async def index_nz_advisories_get_with_http_info( @validate_call - async def index_nz_advisories_get_without_preload_content( + async def index_nvd_cpe_dictionary_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -210048,9 +210048,9 @@ async def index_nz_advisories_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"nz-advisories\" + """Return vulnerability data stored in index \"nvd-cpe-dictionary\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nz-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CERT NZ Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nz-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nz-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nvd-cpe-dictionary index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NVD's CPE Dictionary ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nvd-cpe-dictionary?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nvd-cpe-dictionary?cursor=` :param page: set the page number of the response :type page: int @@ -210122,7 +210122,7 @@ async def index_nz_advisories_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nz_advisories_get_serialize( + _param = self._index_nvd_cpe_dictionary_get_serialize( page=page, limit=limit, cursor=cursor, @@ -210154,7 +210154,7 @@ async def index_nz_advisories_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNZAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNVDCPEDictionaryPaginatePagination", '404': "str", '500': "str", } @@ -210165,7 +210165,7 @@ async def index_nz_advisories_get_without_preload_content( return response_data.response - def _index_nz_advisories_get_serialize( + def _index_nvd_cpe_dictionary_get_serialize( self, page, limit, @@ -210333,7 +210333,7 @@ def _index_nz_advisories_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/nz-advisories', + resource_path='/v3/index/nvd-cpe-dictionary', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -210350,7 +210350,7 @@ def _index_nz_advisories_get_serialize( @validate_call - async def index_octopus_deploy_get( + async def index_nvidia_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -210388,10 +210388,10 @@ async def index_octopus_deploy_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOctopusDeployPaginatePagination: - """Return vulnerability data stored in index \"octopus-deploy\" + ) -> RenderResponseWithMetadataArrayAdvisorySecurityBulletinPaginatePagination: + """Return vulnerability data stored in index \"nvidia\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the octopus-deploy index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Octopus Deploy Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/octopus-deploy?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/octopus-deploy?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nvidia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NVIDIA Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nvidia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nvidia?cursor=` :param page: set the page number of the response :type page: int @@ -210463,7 +210463,7 @@ async def index_octopus_deploy_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_octopus_deploy_get_serialize( + _param = self._index_nvidia_get_serialize( page=page, limit=limit, cursor=cursor, @@ -210495,7 +210495,7 @@ async def index_octopus_deploy_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOctopusDeployPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySecurityBulletinPaginatePagination", '404': "str", '500': "str", } @@ -210511,7 +210511,7 @@ async def index_octopus_deploy_get( @validate_call - async def index_octopus_deploy_get_with_http_info( + async def index_nvidia_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -210549,10 +210549,10 @@ async def index_octopus_deploy_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOctopusDeployPaginatePagination]: - """Return vulnerability data stored in index \"octopus-deploy\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySecurityBulletinPaginatePagination]: + """Return vulnerability data stored in index \"nvidia\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the octopus-deploy index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Octopus Deploy Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/octopus-deploy?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/octopus-deploy?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nvidia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NVIDIA Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nvidia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nvidia?cursor=` :param page: set the page number of the response :type page: int @@ -210624,7 +210624,7 @@ async def index_octopus_deploy_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_octopus_deploy_get_serialize( + _param = self._index_nvidia_get_serialize( page=page, limit=limit, cursor=cursor, @@ -210656,7 +210656,7 @@ async def index_octopus_deploy_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOctopusDeployPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySecurityBulletinPaginatePagination", '404': "str", '500': "str", } @@ -210672,7 +210672,7 @@ async def index_octopus_deploy_get_with_http_info( @validate_call - async def index_octopus_deploy_get_without_preload_content( + async def index_nvidia_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -210711,9 +210711,9 @@ async def index_octopus_deploy_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"octopus-deploy\" + """Return vulnerability data stored in index \"nvidia\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the octopus-deploy index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Octopus Deploy Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/octopus-deploy?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/octopus-deploy?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nvidia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NVIDIA Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nvidia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nvidia?cursor=` :param page: set the page number of the response :type page: int @@ -210785,7 +210785,7 @@ async def index_octopus_deploy_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_octopus_deploy_get_serialize( + _param = self._index_nvidia_get_serialize( page=page, limit=limit, cursor=cursor, @@ -210817,7 +210817,7 @@ async def index_octopus_deploy_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOctopusDeployPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySecurityBulletinPaginatePagination", '404': "str", '500': "str", } @@ -210828,7 +210828,7 @@ async def index_octopus_deploy_get_without_preload_content( return response_data.response - def _index_octopus_deploy_get_serialize( + def _index_nvidia_get_serialize( self, page, limit, @@ -210996,7 +210996,7 @@ def _index_octopus_deploy_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/octopus-deploy', + resource_path='/v3/index/nvidia', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -211013,7 +211013,7 @@ def _index_octopus_deploy_get_serialize( @validate_call - async def index_okta_get( + async def index_nz_advisories_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -211051,10 +211051,10 @@ async def index_okta_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOktaPaginatePagination: - """Return vulnerability data stored in index \"okta\" + ) -> RenderResponseWithMetadataArrayAdvisoryNZAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"nz-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the okta index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Okta Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/okta?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/okta?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nz-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CERT NZ Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nz-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nz-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -211126,7 +211126,7 @@ async def index_okta_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_okta_get_serialize( + _param = self._index_nz_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -211158,7 +211158,7 @@ async def index_okta_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOktaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNZAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -211174,7 +211174,7 @@ async def index_okta_get( @validate_call - async def index_okta_get_with_http_info( + async def index_nz_advisories_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -211212,10 +211212,10 @@ async def index_okta_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOktaPaginatePagination]: - """Return vulnerability data stored in index \"okta\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNZAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"nz-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the okta index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Okta Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/okta?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/okta?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nz-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CERT NZ Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nz-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nz-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -211287,7 +211287,7 @@ async def index_okta_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_okta_get_serialize( + _param = self._index_nz_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -211319,7 +211319,7 @@ async def index_okta_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOktaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNZAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -211335,7 +211335,7 @@ async def index_okta_get_with_http_info( @validate_call - async def index_okta_get_without_preload_content( + async def index_nz_advisories_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -211374,9 +211374,9 @@ async def index_okta_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"okta\" + """Return vulnerability data stored in index \"nz-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the okta index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Okta Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/okta?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/okta?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nz-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CERT NZ Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nz-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nz-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -211448,7 +211448,7 @@ async def index_okta_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_okta_get_serialize( + _param = self._index_nz_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -211480,7 +211480,7 @@ async def index_okta_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOktaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNZAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -211491,7 +211491,7 @@ async def index_okta_get_without_preload_content( return response_data.response - def _index_okta_get_serialize( + def _index_nz_advisories_get_serialize( self, page, limit, @@ -211659,7 +211659,7 @@ def _index_okta_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/okta', + resource_path='/v3/index/nz-advisories', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -211676,7 +211676,7 @@ def _index_okta_get_serialize( @validate_call - async def index_omron_eol_get( + async def index_octopus_deploy_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -211714,10 +211714,10 @@ async def index_omron_eol_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination: - """Return vulnerability data stored in index \"omron-eol\" + ) -> RenderResponseWithMetadataArrayAdvisoryOctopusDeployPaginatePagination: + """Return vulnerability data stored in index \"octopus-deploy\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the omron-eol index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Omron End of Life Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/omron-eol?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/omron-eol?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the octopus-deploy index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Octopus Deploy Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/octopus-deploy?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/octopus-deploy?cursor=` :param page: set the page number of the response :type page: int @@ -211789,7 +211789,7 @@ async def index_omron_eol_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_omron_eol_get_serialize( + _param = self._index_octopus_deploy_get_serialize( page=page, limit=limit, cursor=cursor, @@ -211821,7 +211821,7 @@ async def index_omron_eol_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOctopusDeployPaginatePagination", '404': "str", '500': "str", } @@ -211837,7 +211837,7 @@ async def index_omron_eol_get( @validate_call - async def index_omron_eol_get_with_http_info( + async def index_octopus_deploy_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -211875,10 +211875,10 @@ async def index_omron_eol_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination]: - """Return vulnerability data stored in index \"omron-eol\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOctopusDeployPaginatePagination]: + """Return vulnerability data stored in index \"octopus-deploy\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the omron-eol index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Omron End of Life Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/omron-eol?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/omron-eol?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the octopus-deploy index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Octopus Deploy Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/octopus-deploy?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/octopus-deploy?cursor=` :param page: set the page number of the response :type page: int @@ -211950,7 +211950,7 @@ async def index_omron_eol_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_omron_eol_get_serialize( + _param = self._index_octopus_deploy_get_serialize( page=page, limit=limit, cursor=cursor, @@ -211982,7 +211982,7 @@ async def index_omron_eol_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOctopusDeployPaginatePagination", '404': "str", '500': "str", } @@ -211998,7 +211998,7 @@ async def index_omron_eol_get_with_http_info( @validate_call - async def index_omron_eol_get_without_preload_content( + async def index_octopus_deploy_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -212037,9 +212037,9 @@ async def index_omron_eol_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"omron-eol\" + """Return vulnerability data stored in index \"octopus-deploy\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the omron-eol index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Omron End of Life Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/omron-eol?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/omron-eol?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the octopus-deploy index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Octopus Deploy Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/octopus-deploy?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/octopus-deploy?cursor=` :param page: set the page number of the response :type page: int @@ -212111,7 +212111,7 @@ async def index_omron_eol_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_omron_eol_get_serialize( + _param = self._index_octopus_deploy_get_serialize( page=page, limit=limit, cursor=cursor, @@ -212143,7 +212143,7 @@ async def index_omron_eol_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOctopusDeployPaginatePagination", '404': "str", '500': "str", } @@ -212154,7 +212154,7 @@ async def index_omron_eol_get_without_preload_content( return response_data.response - def _index_omron_eol_get_serialize( + def _index_octopus_deploy_get_serialize( self, page, limit, @@ -212322,7 +212322,7 @@ def _index_omron_eol_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/omron-eol', + resource_path='/v3/index/octopus-deploy', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -212339,7 +212339,7 @@ def _index_omron_eol_get_serialize( @validate_call - async def index_omron_get( + async def index_okta_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -212377,10 +212377,10 @@ async def index_omron_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination: - """Return vulnerability data stored in index \"omron\" + ) -> RenderResponseWithMetadataArrayAdvisoryOktaPaginatePagination: + """Return vulnerability data stored in index \"okta\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the omron index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Omron Vulnerability Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/omron?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/omron?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the okta index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Okta Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/okta?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/okta?cursor=` :param page: set the page number of the response :type page: int @@ -212452,7 +212452,7 @@ async def index_omron_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_omron_get_serialize( + _param = self._index_okta_get_serialize( page=page, limit=limit, cursor=cursor, @@ -212484,7 +212484,7 @@ async def index_omron_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOktaPaginatePagination", '404': "str", '500': "str", } @@ -212500,7 +212500,7 @@ async def index_omron_get( @validate_call - async def index_omron_get_with_http_info( + async def index_okta_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -212538,10 +212538,10 @@ async def index_omron_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination]: - """Return vulnerability data stored in index \"omron\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOktaPaginatePagination]: + """Return vulnerability data stored in index \"okta\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the omron index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Omron Vulnerability Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/omron?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/omron?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the okta index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Okta Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/okta?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/okta?cursor=` :param page: set the page number of the response :type page: int @@ -212613,7 +212613,7 @@ async def index_omron_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_omron_get_serialize( + _param = self._index_okta_get_serialize( page=page, limit=limit, cursor=cursor, @@ -212645,7 +212645,7 @@ async def index_omron_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOktaPaginatePagination", '404': "str", '500': "str", } @@ -212661,7 +212661,7 @@ async def index_omron_get_with_http_info( @validate_call - async def index_omron_get_without_preload_content( + async def index_okta_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -212700,9 +212700,9 @@ async def index_omron_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"omron\" + """Return vulnerability data stored in index \"okta\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the omron index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Omron Vulnerability Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/omron?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/omron?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the okta index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Okta Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/okta?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/okta?cursor=` :param page: set the page number of the response :type page: int @@ -212774,7 +212774,7 @@ async def index_omron_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_omron_get_serialize( + _param = self._index_okta_get_serialize( page=page, limit=limit, cursor=cursor, @@ -212806,7 +212806,7 @@ async def index_omron_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOktaPaginatePagination", '404': "str", '500': "str", } @@ -212817,7 +212817,7 @@ async def index_omron_get_without_preload_content( return response_data.response - def _index_omron_get_serialize( + def _index_okta_get_serialize( self, page, limit, @@ -212985,7 +212985,7 @@ def _index_omron_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/omron', + resource_path='/v3/index/okta', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -213002,7 +213002,7 @@ def _index_omron_get_serialize( @validate_call - async def index_one_e_get( + async def index_omron_eol_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -213040,10 +213040,10 @@ async def index_one_e_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination: - """Return vulnerability data stored in index \"one-e\" + ) -> RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination: + """Return vulnerability data stored in index \"omron-eol\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the one-e index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 1E Published Product Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/one-e?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/one-e?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the omron-eol index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Omron End of Life Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/omron-eol?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/omron-eol?cursor=` :param page: set the page number of the response :type page: int @@ -213115,7 +213115,7 @@ async def index_one_e_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_one_e_get_serialize( + _param = self._index_omron_eol_get_serialize( page=page, limit=limit, cursor=cursor, @@ -213147,7 +213147,7 @@ async def index_one_e_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination", '404': "str", '500': "str", } @@ -213163,7 +213163,7 @@ async def index_one_e_get( @validate_call - async def index_one_e_get_with_http_info( + async def index_omron_eol_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -213201,10 +213201,10 @@ async def index_one_e_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination]: - """Return vulnerability data stored in index \"one-e\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination]: + """Return vulnerability data stored in index \"omron-eol\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the one-e index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 1E Published Product Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/one-e?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/one-e?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the omron-eol index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Omron End of Life Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/omron-eol?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/omron-eol?cursor=` :param page: set the page number of the response :type page: int @@ -213276,7 +213276,7 @@ async def index_one_e_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_one_e_get_serialize( + _param = self._index_omron_eol_get_serialize( page=page, limit=limit, cursor=cursor, @@ -213308,7 +213308,7 @@ async def index_one_e_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination", '404': "str", '500': "str", } @@ -213324,7 +213324,7 @@ async def index_one_e_get_with_http_info( @validate_call - async def index_one_e_get_without_preload_content( + async def index_omron_eol_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -213363,9 +213363,9 @@ async def index_one_e_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"one-e\" + """Return vulnerability data stored in index \"omron-eol\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the one-e index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 1E Published Product Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/one-e?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/one-e?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the omron-eol index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Omron End of Life Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/omron-eol?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/omron-eol?cursor=` :param page: set the page number of the response :type page: int @@ -213437,7 +213437,7 @@ async def index_one_e_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_one_e_get_serialize( + _param = self._index_omron_eol_get_serialize( page=page, limit=limit, cursor=cursor, @@ -213469,7 +213469,7 @@ async def index_one_e_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination", '404': "str", '500': "str", } @@ -213480,7 +213480,7 @@ async def index_one_e_get_without_preload_content( return response_data.response - def _index_one_e_get_serialize( + def _index_omron_eol_get_serialize( self, page, limit, @@ -213648,7 +213648,7 @@ def _index_one_e_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/one-e', + resource_path='/v3/index/omron-eol', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -213665,7 +213665,7 @@ def _index_one_e_get_serialize( @validate_call - async def index_opam_get( + async def index_omron_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -213703,10 +213703,10 @@ async def index_opam_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: - """Return vulnerability data stored in index \"opam\" + ) -> RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination: + """Return vulnerability data stored in index \"omron\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** opam (OCaml) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opam?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the omron index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Omron Vulnerability Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/omron?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/omron?cursor=` :param page: set the page number of the response :type page: int @@ -213778,7 +213778,7 @@ async def index_opam_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_opam_get_serialize( + _param = self._index_omron_get_serialize( page=page, limit=limit, cursor=cursor, @@ -213810,7 +213810,7 @@ async def index_opam_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination", '404': "str", '500': "str", } @@ -213826,7 +213826,7 @@ async def index_opam_get( @validate_call - async def index_opam_get_with_http_info( + async def index_omron_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -213864,10 +213864,10 @@ async def index_opam_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: - """Return vulnerability data stored in index \"opam\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination]: + """Return vulnerability data stored in index \"omron\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** opam (OCaml) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opam?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the omron index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Omron Vulnerability Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/omron?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/omron?cursor=` :param page: set the page number of the response :type page: int @@ -213939,7 +213939,7 @@ async def index_opam_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_opam_get_serialize( + _param = self._index_omron_get_serialize( page=page, limit=limit, cursor=cursor, @@ -213971,7 +213971,7 @@ async def index_opam_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination", '404': "str", '500': "str", } @@ -213987,7 +213987,7 @@ async def index_opam_get_with_http_info( @validate_call - async def index_opam_get_without_preload_content( + async def index_omron_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -214026,9 +214026,9 @@ async def index_opam_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"opam\" + """Return vulnerability data stored in index \"omron\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** opam (OCaml) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opam?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the omron index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Omron Vulnerability Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/omron?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/omron?cursor=` :param page: set the page number of the response :type page: int @@ -214100,7 +214100,7 @@ async def index_opam_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_opam_get_serialize( + _param = self._index_omron_get_serialize( page=page, limit=limit, cursor=cursor, @@ -214132,7 +214132,7 @@ async def index_opam_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination", '404': "str", '500': "str", } @@ -214143,7 +214143,7 @@ async def index_opam_get_without_preload_content( return response_data.response - def _index_opam_get_serialize( + def _index_omron_get_serialize( self, page, limit, @@ -214311,7 +214311,7 @@ def _index_opam_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/opam', + resource_path='/v3/index/omron', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -214328,7 +214328,7 @@ def _index_opam_get_serialize( @validate_call - async def index_open_cvdb_get( + async def index_one_e_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -214366,10 +214366,10 @@ async def index_open_cvdb_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination: - """Return vulnerability data stored in index \"open-cvdb\" + ) -> RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination: + """Return vulnerability data stored in index \"one-e\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the open-cvdb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** The Open Cloud Vulnerability & Security Issue Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/open-cvdb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/open-cvdb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the one-e index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 1E Published Product Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/one-e?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/one-e?cursor=` :param page: set the page number of the response :type page: int @@ -214441,7 +214441,7 @@ async def index_open_cvdb_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_open_cvdb_get_serialize( + _param = self._index_one_e_get_serialize( page=page, limit=limit, cursor=cursor, @@ -214473,7 +214473,7 @@ async def index_open_cvdb_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination", '404': "str", '500': "str", } @@ -214489,7 +214489,7 @@ async def index_open_cvdb_get( @validate_call - async def index_open_cvdb_get_with_http_info( + async def index_one_e_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -214527,10 +214527,10 @@ async def index_open_cvdb_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination]: - """Return vulnerability data stored in index \"open-cvdb\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination]: + """Return vulnerability data stored in index \"one-e\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the open-cvdb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** The Open Cloud Vulnerability & Security Issue Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/open-cvdb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/open-cvdb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the one-e index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 1E Published Product Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/one-e?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/one-e?cursor=` :param page: set the page number of the response :type page: int @@ -214602,7 +214602,7 @@ async def index_open_cvdb_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_open_cvdb_get_serialize( + _param = self._index_one_e_get_serialize( page=page, limit=limit, cursor=cursor, @@ -214634,7 +214634,7 @@ async def index_open_cvdb_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination", '404': "str", '500': "str", } @@ -214650,7 +214650,7 @@ async def index_open_cvdb_get_with_http_info( @validate_call - async def index_open_cvdb_get_without_preload_content( + async def index_one_e_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -214689,9 +214689,9 @@ async def index_open_cvdb_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"open-cvdb\" + """Return vulnerability data stored in index \"one-e\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the open-cvdb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** The Open Cloud Vulnerability & Security Issue Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/open-cvdb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/open-cvdb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the one-e index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 1E Published Product Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/one-e?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/one-e?cursor=` :param page: set the page number of the response :type page: int @@ -214763,7 +214763,7 @@ async def index_open_cvdb_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_open_cvdb_get_serialize( + _param = self._index_one_e_get_serialize( page=page, limit=limit, cursor=cursor, @@ -214795,7 +214795,7 @@ async def index_open_cvdb_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination", '404': "str", '500': "str", } @@ -214806,7 +214806,7 @@ async def index_open_cvdb_get_without_preload_content( return response_data.response - def _index_open_cvdb_get_serialize( + def _index_one_e_get_serialize( self, page, limit, @@ -214974,7 +214974,7 @@ def _index_open_cvdb_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/open-cvdb', + resource_path='/v3/index/one-e', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -214991,7 +214991,7 @@ def _index_open_cvdb_get_serialize( @validate_call - async def index_openbsd_get( + async def index_opam_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -215029,10 +215029,10 @@ async def index_openbsd_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination: - """Return vulnerability data stored in index \"openbsd\" + ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: + """Return vulnerability data stored in index \"opam\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openbsd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenBSD Security Fixes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openbsd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openbsd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** opam (OCaml) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opam?cursor=` :param page: set the page number of the response :type page: int @@ -215104,7 +215104,7 @@ async def index_openbsd_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openbsd_get_serialize( + _param = self._index_opam_get_serialize( page=page, limit=limit, cursor=cursor, @@ -215136,7 +215136,7 @@ async def index_openbsd_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -215152,7 +215152,7 @@ async def index_openbsd_get( @validate_call - async def index_openbsd_get_with_http_info( + async def index_opam_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -215190,10 +215190,10 @@ async def index_openbsd_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination]: - """Return vulnerability data stored in index \"openbsd\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: + """Return vulnerability data stored in index \"opam\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openbsd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenBSD Security Fixes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openbsd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openbsd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** opam (OCaml) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opam?cursor=` :param page: set the page number of the response :type page: int @@ -215265,7 +215265,7 @@ async def index_openbsd_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openbsd_get_serialize( + _param = self._index_opam_get_serialize( page=page, limit=limit, cursor=cursor, @@ -215297,7 +215297,7 @@ async def index_openbsd_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -215313,7 +215313,7 @@ async def index_openbsd_get_with_http_info( @validate_call - async def index_openbsd_get_without_preload_content( + async def index_opam_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -215352,9 +215352,9 @@ async def index_openbsd_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"openbsd\" + """Return vulnerability data stored in index \"opam\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openbsd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenBSD Security Fixes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openbsd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openbsd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** opam (OCaml) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opam?cursor=` :param page: set the page number of the response :type page: int @@ -215426,7 +215426,7 @@ async def index_openbsd_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openbsd_get_serialize( + _param = self._index_opam_get_serialize( page=page, limit=limit, cursor=cursor, @@ -215458,7 +215458,7 @@ async def index_openbsd_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -215469,7 +215469,7 @@ async def index_openbsd_get_without_preload_content( return response_data.response - def _index_openbsd_get_serialize( + def _index_opam_get_serialize( self, page, limit, @@ -215637,7 +215637,7 @@ def _index_openbsd_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/openbsd', + resource_path='/v3/index/opam', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -215654,7 +215654,7 @@ def _index_openbsd_get_serialize( @validate_call - async def index_opengear_get( + async def index_open_cvdb_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -215692,10 +215692,10 @@ async def index_opengear_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination: - """Return vulnerability data stored in index \"opengear\" + ) -> RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination: + """Return vulnerability data stored in index \"open-cvdb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opengear index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Opengear Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opengear?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opengear?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the open-cvdb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** The Open Cloud Vulnerability & Security Issue Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/open-cvdb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/open-cvdb?cursor=` :param page: set the page number of the response :type page: int @@ -215767,7 +215767,7 @@ async def index_opengear_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_opengear_get_serialize( + _param = self._index_open_cvdb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -215799,7 +215799,7 @@ async def index_opengear_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination", '404': "str", '500': "str", } @@ -215815,7 +215815,7 @@ async def index_opengear_get( @validate_call - async def index_opengear_get_with_http_info( + async def index_open_cvdb_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -215853,10 +215853,10 @@ async def index_opengear_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination]: - """Return vulnerability data stored in index \"opengear\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination]: + """Return vulnerability data stored in index \"open-cvdb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opengear index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Opengear Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opengear?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opengear?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the open-cvdb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** The Open Cloud Vulnerability & Security Issue Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/open-cvdb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/open-cvdb?cursor=` :param page: set the page number of the response :type page: int @@ -215928,7 +215928,7 @@ async def index_opengear_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_opengear_get_serialize( + _param = self._index_open_cvdb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -215960,7 +215960,7 @@ async def index_opengear_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination", '404': "str", '500': "str", } @@ -215976,7 +215976,7 @@ async def index_opengear_get_with_http_info( @validate_call - async def index_opengear_get_without_preload_content( + async def index_open_cvdb_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -216015,9 +216015,9 @@ async def index_opengear_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"opengear\" + """Return vulnerability data stored in index \"open-cvdb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opengear index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Opengear Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opengear?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opengear?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the open-cvdb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** The Open Cloud Vulnerability & Security Issue Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/open-cvdb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/open-cvdb?cursor=` :param page: set the page number of the response :type page: int @@ -216089,7 +216089,7 @@ async def index_opengear_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_opengear_get_serialize( + _param = self._index_open_cvdb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -216121,7 +216121,7 @@ async def index_opengear_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination", '404': "str", '500': "str", } @@ -216132,7 +216132,7 @@ async def index_opengear_get_without_preload_content( return response_data.response - def _index_opengear_get_serialize( + def _index_open_cvdb_get_serialize( self, page, limit, @@ -216300,7 +216300,7 @@ def _index_opengear_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/opengear', + resource_path='/v3/index/open-cvdb', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -216317,7 +216317,7 @@ def _index_opengear_get_serialize( @validate_call - async def index_openjdk_get( + async def index_openbsd_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -216355,10 +216355,10 @@ async def index_openjdk_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination: - """Return vulnerability data stored in index \"openjdk\" + ) -> RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination: + """Return vulnerability data stored in index \"openbsd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openjdk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenJDK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openjdk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openjdk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openbsd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenBSD Security Fixes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openbsd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openbsd?cursor=` :param page: set the page number of the response :type page: int @@ -216430,7 +216430,7 @@ async def index_openjdk_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openjdk_get_serialize( + _param = self._index_openbsd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -216462,7 +216462,7 @@ async def index_openjdk_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination", '404': "str", '500': "str", } @@ -216478,7 +216478,7 @@ async def index_openjdk_get( @validate_call - async def index_openjdk_get_with_http_info( + async def index_openbsd_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -216516,10 +216516,10 @@ async def index_openjdk_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination]: - """Return vulnerability data stored in index \"openjdk\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination]: + """Return vulnerability data stored in index \"openbsd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openjdk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenJDK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openjdk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openjdk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openbsd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenBSD Security Fixes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openbsd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openbsd?cursor=` :param page: set the page number of the response :type page: int @@ -216591,7 +216591,7 @@ async def index_openjdk_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openjdk_get_serialize( + _param = self._index_openbsd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -216623,7 +216623,7 @@ async def index_openjdk_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination", '404': "str", '500': "str", } @@ -216639,7 +216639,7 @@ async def index_openjdk_get_with_http_info( @validate_call - async def index_openjdk_get_without_preload_content( + async def index_openbsd_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -216678,9 +216678,9 @@ async def index_openjdk_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"openjdk\" + """Return vulnerability data stored in index \"openbsd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openjdk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenJDK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openjdk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openjdk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openbsd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenBSD Security Fixes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openbsd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openbsd?cursor=` :param page: set the page number of the response :type page: int @@ -216752,7 +216752,7 @@ async def index_openjdk_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openjdk_get_serialize( + _param = self._index_openbsd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -216784,7 +216784,7 @@ async def index_openjdk_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination", '404': "str", '500': "str", } @@ -216795,7 +216795,7 @@ async def index_openjdk_get_without_preload_content( return response_data.response - def _index_openjdk_get_serialize( + def _index_openbsd_get_serialize( self, page, limit, @@ -216963,7 +216963,7 @@ def _index_openjdk_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/openjdk', + resource_path='/v3/index/openbsd', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -216980,7 +216980,7 @@ def _index_openjdk_get_serialize( @validate_call - async def index_openssh_get( + async def index_opengear_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -217018,10 +217018,10 @@ async def index_openssh_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination: - """Return vulnerability data stored in index \"openssh\" + ) -> RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination: + """Return vulnerability data stored in index \"opengear\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssh index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSH Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssh?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssh?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opengear index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Opengear Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opengear?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opengear?cursor=` :param page: set the page number of the response :type page: int @@ -217093,7 +217093,7 @@ async def index_openssh_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openssh_get_serialize( + _param = self._index_opengear_get_serialize( page=page, limit=limit, cursor=cursor, @@ -217125,7 +217125,7 @@ async def index_openssh_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination", '404': "str", '500': "str", } @@ -217141,7 +217141,7 @@ async def index_openssh_get( @validate_call - async def index_openssh_get_with_http_info( + async def index_opengear_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -217179,10 +217179,10 @@ async def index_openssh_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination]: - """Return vulnerability data stored in index \"openssh\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination]: + """Return vulnerability data stored in index \"opengear\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssh index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSH Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssh?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssh?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opengear index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Opengear Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opengear?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opengear?cursor=` :param page: set the page number of the response :type page: int @@ -217254,7 +217254,7 @@ async def index_openssh_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openssh_get_serialize( + _param = self._index_opengear_get_serialize( page=page, limit=limit, cursor=cursor, @@ -217286,7 +217286,7 @@ async def index_openssh_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination", '404': "str", '500': "str", } @@ -217302,7 +217302,7 @@ async def index_openssh_get_with_http_info( @validate_call - async def index_openssh_get_without_preload_content( + async def index_opengear_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -217341,9 +217341,9 @@ async def index_openssh_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"openssh\" + """Return vulnerability data stored in index \"opengear\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssh index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSH Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssh?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssh?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opengear index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Opengear Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opengear?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opengear?cursor=` :param page: set the page number of the response :type page: int @@ -217415,7 +217415,7 @@ async def index_openssh_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openssh_get_serialize( + _param = self._index_opengear_get_serialize( page=page, limit=limit, cursor=cursor, @@ -217447,7 +217447,7 @@ async def index_openssh_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination", '404': "str", '500': "str", } @@ -217458,7 +217458,7 @@ async def index_openssh_get_without_preload_content( return response_data.response - def _index_openssh_get_serialize( + def _index_opengear_get_serialize( self, page, limit, @@ -217626,7 +217626,7 @@ def _index_openssh_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/openssh', + resource_path='/v3/index/opengear', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -217643,7 +217643,7 @@ def _index_openssh_get_serialize( @validate_call - async def index_openssl_secadv_get( + async def index_openjdk_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -217681,10 +217681,10 @@ async def index_openssl_secadv_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination: - """Return vulnerability data stored in index \"openssl-secadv\" + ) -> RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination: + """Return vulnerability data stored in index \"openjdk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssl-secadv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSL Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssl-secadv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssl-secadv?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openjdk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenJDK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openjdk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openjdk?cursor=` :param page: set the page number of the response :type page: int @@ -217756,7 +217756,7 @@ async def index_openssl_secadv_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openssl_secadv_get_serialize( + _param = self._index_openjdk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -217788,7 +217788,7 @@ async def index_openssl_secadv_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination", '404': "str", '500': "str", } @@ -217804,7 +217804,7 @@ async def index_openssl_secadv_get( @validate_call - async def index_openssl_secadv_get_with_http_info( + async def index_openjdk_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -217842,10 +217842,10 @@ async def index_openssl_secadv_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination]: - """Return vulnerability data stored in index \"openssl-secadv\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination]: + """Return vulnerability data stored in index \"openjdk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssl-secadv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSL Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssl-secadv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssl-secadv?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openjdk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenJDK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openjdk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openjdk?cursor=` :param page: set the page number of the response :type page: int @@ -217917,7 +217917,7 @@ async def index_openssl_secadv_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openssl_secadv_get_serialize( + _param = self._index_openjdk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -217949,7 +217949,7 @@ async def index_openssl_secadv_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination", '404': "str", '500': "str", } @@ -217965,7 +217965,7 @@ async def index_openssl_secadv_get_with_http_info( @validate_call - async def index_openssl_secadv_get_without_preload_content( + async def index_openjdk_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -218004,9 +218004,9 @@ async def index_openssl_secadv_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"openssl-secadv\" + """Return vulnerability data stored in index \"openjdk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssl-secadv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSL Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssl-secadv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssl-secadv?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openjdk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenJDK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openjdk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openjdk?cursor=` :param page: set the page number of the response :type page: int @@ -218078,7 +218078,7 @@ async def index_openssl_secadv_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openssl_secadv_get_serialize( + _param = self._index_openjdk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -218110,7 +218110,7 @@ async def index_openssl_secadv_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination", '404': "str", '500': "str", } @@ -218121,7 +218121,7 @@ async def index_openssl_secadv_get_without_preload_content( return response_data.response - def _index_openssl_secadv_get_serialize( + def _index_openjdk_get_serialize( self, page, limit, @@ -218289,7 +218289,7 @@ def _index_openssl_secadv_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/openssl-secadv', + resource_path='/v3/index/openjdk', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -218306,7 +218306,7 @@ def _index_openssl_secadv_get_serialize( @validate_call - async def index_openstack_get( + async def index_openssh_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -218344,10 +218344,10 @@ async def index_openstack_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination: - """Return vulnerability data stored in index \"openstack\" + ) -> RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination: + """Return vulnerability data stored in index \"openssh\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openstack index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenStack Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openstack?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openstack?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssh index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSH Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssh?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssh?cursor=` :param page: set the page number of the response :type page: int @@ -218419,7 +218419,7 @@ async def index_openstack_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openstack_get_serialize( + _param = self._index_openssh_get_serialize( page=page, limit=limit, cursor=cursor, @@ -218451,7 +218451,7 @@ async def index_openstack_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination", '404': "str", '500': "str", } @@ -218467,7 +218467,7 @@ async def index_openstack_get( @validate_call - async def index_openstack_get_with_http_info( + async def index_openssh_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -218505,10 +218505,10 @@ async def index_openstack_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination]: - """Return vulnerability data stored in index \"openstack\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination]: + """Return vulnerability data stored in index \"openssh\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openstack index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenStack Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openstack?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openstack?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssh index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSH Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssh?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssh?cursor=` :param page: set the page number of the response :type page: int @@ -218580,7 +218580,7 @@ async def index_openstack_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openstack_get_serialize( + _param = self._index_openssh_get_serialize( page=page, limit=limit, cursor=cursor, @@ -218612,7 +218612,7 @@ async def index_openstack_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination", '404': "str", '500': "str", } @@ -218628,7 +218628,7 @@ async def index_openstack_get_with_http_info( @validate_call - async def index_openstack_get_without_preload_content( + async def index_openssh_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -218667,9 +218667,9 @@ async def index_openstack_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"openstack\" + """Return vulnerability data stored in index \"openssh\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openstack index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenStack Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openstack?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openstack?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssh index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSH Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssh?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssh?cursor=` :param page: set the page number of the response :type page: int @@ -218741,7 +218741,7 @@ async def index_openstack_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openstack_get_serialize( + _param = self._index_openssh_get_serialize( page=page, limit=limit, cursor=cursor, @@ -218773,7 +218773,7 @@ async def index_openstack_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination", '404': "str", '500': "str", } @@ -218784,7 +218784,7 @@ async def index_openstack_get_without_preload_content( return response_data.response - def _index_openstack_get_serialize( + def _index_openssh_get_serialize( self, page, limit, @@ -218952,7 +218952,7 @@ def _index_openstack_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/openstack', + resource_path='/v3/index/openssh', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -218969,7 +218969,7 @@ def _index_openstack_get_serialize( @validate_call - async def index_openwrt_get( + async def index_openssl_secadv_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -219007,10 +219007,10 @@ async def index_openwrt_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination: - """Return vulnerability data stored in index \"openwrt\" + ) -> RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination: + """Return vulnerability data stored in index \"openssl-secadv\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openwrt index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenWrt Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openwrt?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openwrt?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssl-secadv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSL Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssl-secadv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssl-secadv?cursor=` :param page: set the page number of the response :type page: int @@ -219082,7 +219082,7 @@ async def index_openwrt_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openwrt_get_serialize( + _param = self._index_openssl_secadv_get_serialize( page=page, limit=limit, cursor=cursor, @@ -219114,7 +219114,7 @@ async def index_openwrt_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination", '404': "str", '500': "str", } @@ -219130,7 +219130,7 @@ async def index_openwrt_get( @validate_call - async def index_openwrt_get_with_http_info( + async def index_openssl_secadv_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -219168,10 +219168,10 @@ async def index_openwrt_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination]: - """Return vulnerability data stored in index \"openwrt\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination]: + """Return vulnerability data stored in index \"openssl-secadv\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openwrt index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenWrt Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openwrt?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openwrt?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssl-secadv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSL Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssl-secadv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssl-secadv?cursor=` :param page: set the page number of the response :type page: int @@ -219243,7 +219243,7 @@ async def index_openwrt_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openwrt_get_serialize( + _param = self._index_openssl_secadv_get_serialize( page=page, limit=limit, cursor=cursor, @@ -219275,7 +219275,7 @@ async def index_openwrt_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination", '404': "str", '500': "str", } @@ -219291,7 +219291,7 @@ async def index_openwrt_get_with_http_info( @validate_call - async def index_openwrt_get_without_preload_content( + async def index_openssl_secadv_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -219330,9 +219330,9 @@ async def index_openwrt_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"openwrt\" + """Return vulnerability data stored in index \"openssl-secadv\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openwrt index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenWrt Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openwrt?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openwrt?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssl-secadv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSL Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssl-secadv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssl-secadv?cursor=` :param page: set the page number of the response :type page: int @@ -219404,7 +219404,7 @@ async def index_openwrt_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openwrt_get_serialize( + _param = self._index_openssl_secadv_get_serialize( page=page, limit=limit, cursor=cursor, @@ -219436,7 +219436,7 @@ async def index_openwrt_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination", '404': "str", '500': "str", } @@ -219447,7 +219447,7 @@ async def index_openwrt_get_without_preload_content( return response_data.response - def _index_openwrt_get_serialize( + def _index_openssl_secadv_get_serialize( self, page, limit, @@ -219615,7 +219615,7 @@ def _index_openwrt_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/openwrt', + resource_path='/v3/index/openssl-secadv', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -219632,7 +219632,7 @@ def _index_openwrt_get_serialize( @validate_call - async def index_oracle_cpu_csaf_get( + async def index_openstack_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -219670,10 +219670,10 @@ async def index_oracle_cpu_csaf_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination: - """Return vulnerability data stored in index \"oracle-cpu-csaf\" + ) -> RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination: + """Return vulnerability data stored in index \"openstack\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu-csaf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Updates CSAF ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu-csaf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu-csaf?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openstack index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenStack Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openstack?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openstack?cursor=` :param page: set the page number of the response :type page: int @@ -219745,7 +219745,7 @@ async def index_oracle_cpu_csaf_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_oracle_cpu_csaf_get_serialize( + _param = self._index_openstack_get_serialize( page=page, limit=limit, cursor=cursor, @@ -219777,7 +219777,7 @@ async def index_oracle_cpu_csaf_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination", '404': "str", '500': "str", } @@ -219793,7 +219793,7 @@ async def index_oracle_cpu_csaf_get( @validate_call - async def index_oracle_cpu_csaf_get_with_http_info( + async def index_openstack_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -219831,10 +219831,10 @@ async def index_oracle_cpu_csaf_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination]: - """Return vulnerability data stored in index \"oracle-cpu-csaf\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination]: + """Return vulnerability data stored in index \"openstack\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu-csaf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Updates CSAF ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu-csaf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu-csaf?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openstack index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenStack Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openstack?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openstack?cursor=` :param page: set the page number of the response :type page: int @@ -219906,7 +219906,7 @@ async def index_oracle_cpu_csaf_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_oracle_cpu_csaf_get_serialize( + _param = self._index_openstack_get_serialize( page=page, limit=limit, cursor=cursor, @@ -219938,7 +219938,7 @@ async def index_oracle_cpu_csaf_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination", '404': "str", '500': "str", } @@ -219954,7 +219954,7 @@ async def index_oracle_cpu_csaf_get_with_http_info( @validate_call - async def index_oracle_cpu_csaf_get_without_preload_content( + async def index_openstack_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -219993,9 +219993,9 @@ async def index_oracle_cpu_csaf_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"oracle-cpu-csaf\" + """Return vulnerability data stored in index \"openstack\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu-csaf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Updates CSAF ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu-csaf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu-csaf?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openstack index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenStack Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openstack?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openstack?cursor=` :param page: set the page number of the response :type page: int @@ -220067,7 +220067,7 @@ async def index_oracle_cpu_csaf_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_oracle_cpu_csaf_get_serialize( + _param = self._index_openstack_get_serialize( page=page, limit=limit, cursor=cursor, @@ -220099,7 +220099,7 @@ async def index_oracle_cpu_csaf_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination", '404': "str", '500': "str", } @@ -220110,7 +220110,7 @@ async def index_oracle_cpu_csaf_get_without_preload_content( return response_data.response - def _index_oracle_cpu_csaf_get_serialize( + def _index_openstack_get_serialize( self, page, limit, @@ -220278,7 +220278,7 @@ def _index_oracle_cpu_csaf_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/oracle-cpu-csaf', + resource_path='/v3/index/openstack', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -220295,7 +220295,7 @@ def _index_oracle_cpu_csaf_get_serialize( @validate_call - async def index_oracle_cpu_get( + async def index_openwrt_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -220333,10 +220333,10 @@ async def index_oracle_cpu_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination: - """Return vulnerability data stored in index \"oracle-cpu\" + ) -> RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination: + """Return vulnerability data stored in index \"openwrt\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Update Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openwrt index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenWrt Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openwrt?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openwrt?cursor=` :param page: set the page number of the response :type page: int @@ -220408,7 +220408,7 @@ async def index_oracle_cpu_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_oracle_cpu_get_serialize( + _param = self._index_openwrt_get_serialize( page=page, limit=limit, cursor=cursor, @@ -220440,7 +220440,7 @@ async def index_oracle_cpu_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination", '404': "str", '500': "str", } @@ -220456,7 +220456,7 @@ async def index_oracle_cpu_get( @validate_call - async def index_oracle_cpu_get_with_http_info( + async def index_openwrt_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -220494,10 +220494,10 @@ async def index_oracle_cpu_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination]: - """Return vulnerability data stored in index \"oracle-cpu\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination]: + """Return vulnerability data stored in index \"openwrt\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Update Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openwrt index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenWrt Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openwrt?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openwrt?cursor=` :param page: set the page number of the response :type page: int @@ -220569,7 +220569,7 @@ async def index_oracle_cpu_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_oracle_cpu_get_serialize( + _param = self._index_openwrt_get_serialize( page=page, limit=limit, cursor=cursor, @@ -220601,7 +220601,7 @@ async def index_oracle_cpu_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination", '404': "str", '500': "str", } @@ -220617,7 +220617,7 @@ async def index_oracle_cpu_get_with_http_info( @validate_call - async def index_oracle_cpu_get_without_preload_content( + async def index_openwrt_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -220656,9 +220656,9 @@ async def index_oracle_cpu_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"oracle-cpu\" + """Return vulnerability data stored in index \"openwrt\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Update Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openwrt index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenWrt Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openwrt?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openwrt?cursor=` :param page: set the page number of the response :type page: int @@ -220730,7 +220730,7 @@ async def index_oracle_cpu_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_oracle_cpu_get_serialize( + _param = self._index_openwrt_get_serialize( page=page, limit=limit, cursor=cursor, @@ -220762,7 +220762,7 @@ async def index_oracle_cpu_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination", '404': "str", '500': "str", } @@ -220773,7 +220773,7 @@ async def index_oracle_cpu_get_without_preload_content( return response_data.response - def _index_oracle_cpu_get_serialize( + def _index_openwrt_get_serialize( self, page, limit, @@ -220941,7 +220941,7 @@ def _index_oracle_cpu_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/oracle-cpu', + resource_path='/v3/index/openwrt', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -220958,7 +220958,7 @@ def _index_oracle_cpu_get_serialize( @validate_call - async def index_oracle_get( + async def index_oracle_cpu_csaf_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -220996,10 +220996,10 @@ async def index_oracle_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination: - """Return vulnerability data stored in index \"oracle\" + ) -> RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination: + """Return vulnerability data stored in index \"oracle-cpu-csaf\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu-csaf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Updates CSAF ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu-csaf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu-csaf?cursor=` :param page: set the page number of the response :type page: int @@ -221071,7 +221071,7 @@ async def index_oracle_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_oracle_get_serialize( + _param = self._index_oracle_cpu_csaf_get_serialize( page=page, limit=limit, cursor=cursor, @@ -221103,7 +221103,7 @@ async def index_oracle_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination", '404': "str", '500': "str", } @@ -221119,7 +221119,7 @@ async def index_oracle_get( @validate_call - async def index_oracle_get_with_http_info( + async def index_oracle_cpu_csaf_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -221157,10 +221157,10 @@ async def index_oracle_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination]: - """Return vulnerability data stored in index \"oracle\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination]: + """Return vulnerability data stored in index \"oracle-cpu-csaf\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu-csaf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Updates CSAF ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu-csaf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu-csaf?cursor=` :param page: set the page number of the response :type page: int @@ -221232,7 +221232,7 @@ async def index_oracle_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_oracle_get_serialize( + _param = self._index_oracle_cpu_csaf_get_serialize( page=page, limit=limit, cursor=cursor, @@ -221264,7 +221264,7 @@ async def index_oracle_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination", '404': "str", '500': "str", } @@ -221280,7 +221280,7 @@ async def index_oracle_get_with_http_info( @validate_call - async def index_oracle_get_without_preload_content( + async def index_oracle_cpu_csaf_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -221319,9 +221319,9 @@ async def index_oracle_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"oracle\" + """Return vulnerability data stored in index \"oracle-cpu-csaf\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu-csaf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Updates CSAF ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu-csaf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu-csaf?cursor=` :param page: set the page number of the response :type page: int @@ -221393,7 +221393,7 @@ async def index_oracle_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_oracle_get_serialize( + _param = self._index_oracle_cpu_csaf_get_serialize( page=page, limit=limit, cursor=cursor, @@ -221425,7 +221425,7 @@ async def index_oracle_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination", '404': "str", '500': "str", } @@ -221436,7 +221436,7 @@ async def index_oracle_get_without_preload_content( return response_data.response - def _index_oracle_get_serialize( + def _index_oracle_cpu_csaf_get_serialize( self, page, limit, @@ -221604,7 +221604,7 @@ def _index_oracle_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/oracle', + resource_path='/v3/index/oracle-cpu-csaf', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -221621,7 +221621,7 @@ def _index_oracle_get_serialize( @validate_call - async def index_osv_get( + async def index_oracle_cpu_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -221659,10 +221659,10 @@ async def index_osv_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination: - """Return vulnerability data stored in index \"osv\" + ) -> RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination: + """Return vulnerability data stored in index \"oracle-cpu\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the osv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Open Source Vulnerabilities Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/osv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/osv?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Update Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu?cursor=` :param page: set the page number of the response :type page: int @@ -221734,7 +221734,7 @@ async def index_osv_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_osv_get_serialize( + _param = self._index_oracle_cpu_get_serialize( page=page, limit=limit, cursor=cursor, @@ -221766,7 +221766,7 @@ async def index_osv_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination", '404': "str", '500': "str", } @@ -221782,7 +221782,7 @@ async def index_osv_get( @validate_call - async def index_osv_get_with_http_info( + async def index_oracle_cpu_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -221820,10 +221820,10 @@ async def index_osv_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination]: - """Return vulnerability data stored in index \"osv\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination]: + """Return vulnerability data stored in index \"oracle-cpu\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the osv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Open Source Vulnerabilities Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/osv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/osv?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Update Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu?cursor=` :param page: set the page number of the response :type page: int @@ -221895,7 +221895,7 @@ async def index_osv_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_osv_get_serialize( + _param = self._index_oracle_cpu_get_serialize( page=page, limit=limit, cursor=cursor, @@ -221927,7 +221927,7 @@ async def index_osv_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination", '404': "str", '500': "str", } @@ -221943,7 +221943,7 @@ async def index_osv_get_with_http_info( @validate_call - async def index_osv_get_without_preload_content( + async def index_oracle_cpu_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -221982,9 +221982,9 @@ async def index_osv_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"osv\" + """Return vulnerability data stored in index \"oracle-cpu\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the osv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Open Source Vulnerabilities Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/osv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/osv?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Update Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu?cursor=` :param page: set the page number of the response :type page: int @@ -222056,7 +222056,7 @@ async def index_osv_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_osv_get_serialize( + _param = self._index_oracle_cpu_get_serialize( page=page, limit=limit, cursor=cursor, @@ -222088,7 +222088,7 @@ async def index_osv_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination", '404': "str", '500': "str", } @@ -222099,7 +222099,7 @@ async def index_osv_get_without_preload_content( return response_data.response - def _index_osv_get_serialize( + def _index_oracle_cpu_get_serialize( self, page, limit, @@ -222267,7 +222267,7 @@ def _index_osv_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/osv', + resource_path='/v3/index/oracle-cpu', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -222284,7 +222284,7 @@ def _index_osv_get_serialize( @validate_call - async def index_otrs_get( + async def index_oracle_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -222322,10 +222322,10 @@ async def index_otrs_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination: - """Return vulnerability data stored in index \"otrs\" + ) -> RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination: + """Return vulnerability data stored in index \"oracle\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the otrs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OTRS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/otrs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/otrs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle?cursor=` :param page: set the page number of the response :type page: int @@ -222397,7 +222397,7 @@ async def index_otrs_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_otrs_get_serialize( + _param = self._index_oracle_get_serialize( page=page, limit=limit, cursor=cursor, @@ -222429,7 +222429,7 @@ async def index_otrs_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination", '404': "str", '500': "str", } @@ -222445,7 +222445,7 @@ async def index_otrs_get( @validate_call - async def index_otrs_get_with_http_info( + async def index_oracle_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -222483,10 +222483,10 @@ async def index_otrs_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination]: - """Return vulnerability data stored in index \"otrs\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination]: + """Return vulnerability data stored in index \"oracle\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the otrs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OTRS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/otrs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/otrs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle?cursor=` :param page: set the page number of the response :type page: int @@ -222558,7 +222558,7 @@ async def index_otrs_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_otrs_get_serialize( + _param = self._index_oracle_get_serialize( page=page, limit=limit, cursor=cursor, @@ -222590,7 +222590,7 @@ async def index_otrs_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination", '404': "str", '500': "str", } @@ -222606,7 +222606,7 @@ async def index_otrs_get_with_http_info( @validate_call - async def index_otrs_get_without_preload_content( + async def index_oracle_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -222645,9 +222645,9 @@ async def index_otrs_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"otrs\" + """Return vulnerability data stored in index \"oracle\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the otrs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OTRS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/otrs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/otrs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle?cursor=` :param page: set the page number of the response :type page: int @@ -222719,7 +222719,7 @@ async def index_otrs_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_otrs_get_serialize( + _param = self._index_oracle_get_serialize( page=page, limit=limit, cursor=cursor, @@ -222751,7 +222751,7 @@ async def index_otrs_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination", '404': "str", '500': "str", } @@ -222762,7 +222762,7 @@ async def index_otrs_get_without_preload_content( return response_data.response - def _index_otrs_get_serialize( + def _index_oracle_get_serialize( self, page, limit, @@ -222930,7 +222930,7 @@ def _index_otrs_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/otrs', + resource_path='/v3/index/oracle', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -222947,7 +222947,7 @@ def _index_otrs_get_serialize( @validate_call - async def index_owncloud_get( + async def index_osv_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -222985,10 +222985,10 @@ async def index_owncloud_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination: - """Return vulnerability data stored in index \"owncloud\" + ) -> RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination: + """Return vulnerability data stored in index \"osv\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the owncloud index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OwnCloud Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/owncloud?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/owncloud?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the osv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Open Source Vulnerabilities Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/osv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/osv?cursor=` :param page: set the page number of the response :type page: int @@ -223060,7 +223060,7 @@ async def index_owncloud_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_owncloud_get_serialize( + _param = self._index_osv_get_serialize( page=page, limit=limit, cursor=cursor, @@ -223092,7 +223092,7 @@ async def index_owncloud_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination", '404': "str", '500': "str", } @@ -223108,7 +223108,7 @@ async def index_owncloud_get( @validate_call - async def index_owncloud_get_with_http_info( + async def index_osv_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -223146,10 +223146,10 @@ async def index_owncloud_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination]: - """Return vulnerability data stored in index \"owncloud\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination]: + """Return vulnerability data stored in index \"osv\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the owncloud index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OwnCloud Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/owncloud?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/owncloud?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the osv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Open Source Vulnerabilities Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/osv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/osv?cursor=` :param page: set the page number of the response :type page: int @@ -223221,7 +223221,7 @@ async def index_owncloud_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_owncloud_get_serialize( + _param = self._index_osv_get_serialize( page=page, limit=limit, cursor=cursor, @@ -223253,7 +223253,7 @@ async def index_owncloud_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination", '404': "str", '500': "str", } @@ -223269,7 +223269,7 @@ async def index_owncloud_get_with_http_info( @validate_call - async def index_owncloud_get_without_preload_content( + async def index_osv_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -223308,9 +223308,9 @@ async def index_owncloud_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"owncloud\" + """Return vulnerability data stored in index \"osv\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the owncloud index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OwnCloud Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/owncloud?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/owncloud?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the osv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Open Source Vulnerabilities Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/osv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/osv?cursor=` :param page: set the page number of the response :type page: int @@ -223382,7 +223382,7 @@ async def index_owncloud_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_owncloud_get_serialize( + _param = self._index_osv_get_serialize( page=page, limit=limit, cursor=cursor, @@ -223414,7 +223414,7 @@ async def index_owncloud_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination", '404': "str", '500': "str", } @@ -223425,7 +223425,7 @@ async def index_owncloud_get_without_preload_content( return response_data.response - def _index_owncloud_get_serialize( + def _index_osv_get_serialize( self, page, limit, @@ -223593,7 +223593,7 @@ def _index_owncloud_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/owncloud', + resource_path='/v3/index/osv', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -223610,7 +223610,7 @@ def _index_owncloud_get_serialize( @validate_call - async def index_packetstorm_get( + async def index_otrs_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -223648,10 +223648,10 @@ async def index_packetstorm_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination: - """Return vulnerability data stored in index \"packetstorm\" + ) -> RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination: + """Return vulnerability data stored in index \"otrs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the packetstorm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PacketStorm ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/packetstorm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/packetstorm?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the otrs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OTRS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/otrs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/otrs?cursor=` :param page: set the page number of the response :type page: int @@ -223723,7 +223723,7 @@ async def index_packetstorm_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_packetstorm_get_serialize( + _param = self._index_otrs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -223755,7 +223755,7 @@ async def index_packetstorm_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination", '404': "str", '500': "str", } @@ -223771,7 +223771,7 @@ async def index_packetstorm_get( @validate_call - async def index_packetstorm_get_with_http_info( + async def index_otrs_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -223809,10 +223809,10 @@ async def index_packetstorm_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination]: - """Return vulnerability data stored in index \"packetstorm\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination]: + """Return vulnerability data stored in index \"otrs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the packetstorm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PacketStorm ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/packetstorm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/packetstorm?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the otrs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OTRS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/otrs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/otrs?cursor=` :param page: set the page number of the response :type page: int @@ -223884,7 +223884,7 @@ async def index_packetstorm_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_packetstorm_get_serialize( + _param = self._index_otrs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -223916,7 +223916,7 @@ async def index_packetstorm_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination", '404': "str", '500': "str", } @@ -223932,7 +223932,7 @@ async def index_packetstorm_get_with_http_info( @validate_call - async def index_packetstorm_get_without_preload_content( + async def index_otrs_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -223971,9 +223971,9 @@ async def index_packetstorm_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"packetstorm\" + """Return vulnerability data stored in index \"otrs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the packetstorm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PacketStorm ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/packetstorm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/packetstorm?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the otrs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OTRS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/otrs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/otrs?cursor=` :param page: set the page number of the response :type page: int @@ -224045,7 +224045,7 @@ async def index_packetstorm_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_packetstorm_get_serialize( + _param = self._index_otrs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -224077,7 +224077,7 @@ async def index_packetstorm_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination", '404': "str", '500': "str", } @@ -224088,7 +224088,7 @@ async def index_packetstorm_get_without_preload_content( return response_data.response - def _index_packetstorm_get_serialize( + def _index_otrs_get_serialize( self, page, limit, @@ -224256,7 +224256,7 @@ def _index_packetstorm_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/packetstorm', + resource_path='/v3/index/otrs', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -224273,7 +224273,7 @@ def _index_packetstorm_get_serialize( @validate_call - async def index_palantir_get( + async def index_owncloud_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -224311,10 +224311,10 @@ async def index_palantir_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination: - """Return vulnerability data stored in index \"palantir\" + ) -> RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination: + """Return vulnerability data stored in index \"owncloud\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palantir index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palantir Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palantir?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palantir?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the owncloud index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OwnCloud Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/owncloud?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/owncloud?cursor=` :param page: set the page number of the response :type page: int @@ -224386,7 +224386,7 @@ async def index_palantir_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_palantir_get_serialize( + _param = self._index_owncloud_get_serialize( page=page, limit=limit, cursor=cursor, @@ -224418,7 +224418,7 @@ async def index_palantir_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination", '404': "str", '500': "str", } @@ -224434,7 +224434,7 @@ async def index_palantir_get( @validate_call - async def index_palantir_get_with_http_info( + async def index_owncloud_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -224472,10 +224472,10 @@ async def index_palantir_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination]: - """Return vulnerability data stored in index \"palantir\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination]: + """Return vulnerability data stored in index \"owncloud\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palantir index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palantir Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palantir?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palantir?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the owncloud index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OwnCloud Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/owncloud?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/owncloud?cursor=` :param page: set the page number of the response :type page: int @@ -224547,7 +224547,7 @@ async def index_palantir_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_palantir_get_serialize( + _param = self._index_owncloud_get_serialize( page=page, limit=limit, cursor=cursor, @@ -224579,7 +224579,7 @@ async def index_palantir_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination", '404': "str", '500': "str", } @@ -224595,7 +224595,7 @@ async def index_palantir_get_with_http_info( @validate_call - async def index_palantir_get_without_preload_content( + async def index_owncloud_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -224634,9 +224634,9 @@ async def index_palantir_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"palantir\" + """Return vulnerability data stored in index \"owncloud\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palantir index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palantir Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palantir?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palantir?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the owncloud index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OwnCloud Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/owncloud?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/owncloud?cursor=` :param page: set the page number of the response :type page: int @@ -224708,7 +224708,7 @@ async def index_palantir_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_palantir_get_serialize( + _param = self._index_owncloud_get_serialize( page=page, limit=limit, cursor=cursor, @@ -224740,7 +224740,7 @@ async def index_palantir_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination", '404': "str", '500': "str", } @@ -224751,7 +224751,7 @@ async def index_palantir_get_without_preload_content( return response_data.response - def _index_palantir_get_serialize( + def _index_owncloud_get_serialize( self, page, limit, @@ -224919,7 +224919,7 @@ def _index_palantir_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/palantir', + resource_path='/v3/index/owncloud', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -224936,7 +224936,7 @@ def _index_palantir_get_serialize( @validate_call - async def index_palo_alto_get( + async def index_packetstorm_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -224974,10 +224974,10 @@ async def index_palo_alto_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"palo-alto\" + ) -> RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination: + """Return vulnerability data stored in index \"packetstorm\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palo-alto index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palo Alto Networks Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palo-alto?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palo-alto?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the packetstorm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PacketStorm ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/packetstorm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/packetstorm?cursor=` :param page: set the page number of the response :type page: int @@ -225049,7 +225049,7 @@ async def index_palo_alto_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_palo_alto_get_serialize( + _param = self._index_packetstorm_get_serialize( page=page, limit=limit, cursor=cursor, @@ -225081,7 +225081,7 @@ async def index_palo_alto_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination", '404': "str", '500': "str", } @@ -225097,7 +225097,7 @@ async def index_palo_alto_get( @validate_call - async def index_palo_alto_get_with_http_info( + async def index_packetstorm_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -225135,10 +225135,10 @@ async def index_palo_alto_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"palo-alto\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination]: + """Return vulnerability data stored in index \"packetstorm\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palo-alto index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palo Alto Networks Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palo-alto?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palo-alto?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the packetstorm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PacketStorm ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/packetstorm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/packetstorm?cursor=` :param page: set the page number of the response :type page: int @@ -225210,7 +225210,7 @@ async def index_palo_alto_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_palo_alto_get_serialize( + _param = self._index_packetstorm_get_serialize( page=page, limit=limit, cursor=cursor, @@ -225242,7 +225242,7 @@ async def index_palo_alto_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination", '404': "str", '500': "str", } @@ -225258,7 +225258,7 @@ async def index_palo_alto_get_with_http_info( @validate_call - async def index_palo_alto_get_without_preload_content( + async def index_packetstorm_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -225297,9 +225297,9 @@ async def index_palo_alto_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"palo-alto\" + """Return vulnerability data stored in index \"packetstorm\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palo-alto index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palo Alto Networks Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palo-alto?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palo-alto?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the packetstorm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PacketStorm ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/packetstorm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/packetstorm?cursor=` :param page: set the page number of the response :type page: int @@ -225371,7 +225371,7 @@ async def index_palo_alto_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_palo_alto_get_serialize( + _param = self._index_packetstorm_get_serialize( page=page, limit=limit, cursor=cursor, @@ -225403,7 +225403,7 @@ async def index_palo_alto_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination", '404': "str", '500': "str", } @@ -225414,7 +225414,7 @@ async def index_palo_alto_get_without_preload_content( return response_data.response - def _index_palo_alto_get_serialize( + def _index_packetstorm_get_serialize( self, page, limit, @@ -225582,7 +225582,7 @@ def _index_palo_alto_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/palo-alto', + resource_path='/v3/index/packetstorm', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -225599,7 +225599,7 @@ def _index_palo_alto_get_serialize( @validate_call - async def index_panasonic_get( + async def index_palantir_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -225637,10 +225637,10 @@ async def index_panasonic_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination: - """Return vulnerability data stored in index \"panasonic\" + ) -> RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination: + """Return vulnerability data stored in index \"palantir\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the panasonic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Panasonic Vulnerability Advisory List ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/panasonic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/panasonic?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palantir index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palantir Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palantir?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palantir?cursor=` :param page: set the page number of the response :type page: int @@ -225712,7 +225712,7 @@ async def index_panasonic_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_panasonic_get_serialize( + _param = self._index_palantir_get_serialize( page=page, limit=limit, cursor=cursor, @@ -225744,7 +225744,7 @@ async def index_panasonic_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination", '404': "str", '500': "str", } @@ -225760,7 +225760,7 @@ async def index_panasonic_get( @validate_call - async def index_panasonic_get_with_http_info( + async def index_palantir_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -225798,10 +225798,10 @@ async def index_panasonic_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination]: - """Return vulnerability data stored in index \"panasonic\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination]: + """Return vulnerability data stored in index \"palantir\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the panasonic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Panasonic Vulnerability Advisory List ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/panasonic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/panasonic?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palantir index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palantir Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palantir?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palantir?cursor=` :param page: set the page number of the response :type page: int @@ -225873,7 +225873,7 @@ async def index_panasonic_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_panasonic_get_serialize( + _param = self._index_palantir_get_serialize( page=page, limit=limit, cursor=cursor, @@ -225905,7 +225905,7 @@ async def index_panasonic_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination", '404': "str", '500': "str", } @@ -225921,7 +225921,7 @@ async def index_panasonic_get_with_http_info( @validate_call - async def index_panasonic_get_without_preload_content( + async def index_palantir_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -225960,9 +225960,9 @@ async def index_panasonic_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"panasonic\" + """Return vulnerability data stored in index \"palantir\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the panasonic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Panasonic Vulnerability Advisory List ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/panasonic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/panasonic?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palantir index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palantir Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palantir?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palantir?cursor=` :param page: set the page number of the response :type page: int @@ -226034,7 +226034,7 @@ async def index_panasonic_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_panasonic_get_serialize( + _param = self._index_palantir_get_serialize( page=page, limit=limit, cursor=cursor, @@ -226066,7 +226066,7 @@ async def index_panasonic_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination", '404': "str", '500': "str", } @@ -226077,7 +226077,7 @@ async def index_panasonic_get_without_preload_content( return response_data.response - def _index_panasonic_get_serialize( + def _index_palantir_get_serialize( self, page, limit, @@ -226245,7 +226245,7 @@ def _index_panasonic_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/panasonic', + resource_path='/v3/index/palantir', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -226262,7 +226262,7 @@ def _index_panasonic_get_serialize( @validate_call - async def index_papercut_get( + async def index_palo_alto_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -226300,10 +226300,10 @@ async def index_papercut_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination: - """Return vulnerability data stored in index \"papercut\" + ) -> RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"palo-alto\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the papercut index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PaperCut Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/papercut?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/papercut?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palo-alto index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palo Alto Networks Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palo-alto?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palo-alto?cursor=` :param page: set the page number of the response :type page: int @@ -226375,7 +226375,7 @@ async def index_papercut_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_papercut_get_serialize( + _param = self._index_palo_alto_get_serialize( page=page, limit=limit, cursor=cursor, @@ -226407,7 +226407,7 @@ async def index_papercut_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -226423,7 +226423,7 @@ async def index_papercut_get( @validate_call - async def index_papercut_get_with_http_info( + async def index_palo_alto_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -226461,10 +226461,10 @@ async def index_papercut_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination]: - """Return vulnerability data stored in index \"papercut\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"palo-alto\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the papercut index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PaperCut Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/papercut?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/papercut?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palo-alto index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palo Alto Networks Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palo-alto?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palo-alto?cursor=` :param page: set the page number of the response :type page: int @@ -226536,7 +226536,7 @@ async def index_papercut_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_papercut_get_serialize( + _param = self._index_palo_alto_get_serialize( page=page, limit=limit, cursor=cursor, @@ -226568,7 +226568,7 @@ async def index_papercut_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -226584,7 +226584,7 @@ async def index_papercut_get_with_http_info( @validate_call - async def index_papercut_get_without_preload_content( + async def index_palo_alto_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -226623,9 +226623,9 @@ async def index_papercut_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"papercut\" + """Return vulnerability data stored in index \"palo-alto\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the papercut index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PaperCut Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/papercut?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/papercut?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palo-alto index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palo Alto Networks Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palo-alto?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palo-alto?cursor=` :param page: set the page number of the response :type page: int @@ -226697,7 +226697,7 @@ async def index_papercut_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_papercut_get_serialize( + _param = self._index_palo_alto_get_serialize( page=page, limit=limit, cursor=cursor, @@ -226729,7 +226729,7 @@ async def index_papercut_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -226740,7 +226740,7 @@ async def index_papercut_get_without_preload_content( return response_data.response - def _index_papercut_get_serialize( + def _index_palo_alto_get_serialize( self, page, limit, @@ -226908,7 +226908,7 @@ def _index_papercut_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/papercut', + resource_path='/v3/index/palo-alto', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -226925,7 +226925,7 @@ def _index_papercut_get_serialize( @validate_call - async def index_pega_get( + async def index_panasonic_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -226963,10 +226963,10 @@ async def index_pega_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination: - """Return vulnerability data stored in index \"pega\" + ) -> RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination: + """Return vulnerability data stored in index \"panasonic\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pega index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pega Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pega?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pega?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the panasonic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Panasonic Vulnerability Advisory List ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/panasonic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/panasonic?cursor=` :param page: set the page number of the response :type page: int @@ -227038,7 +227038,7 @@ async def index_pega_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pega_get_serialize( + _param = self._index_panasonic_get_serialize( page=page, limit=limit, cursor=cursor, @@ -227070,7 +227070,7 @@ async def index_pega_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination", '404': "str", '500': "str", } @@ -227086,7 +227086,7 @@ async def index_pega_get( @validate_call - async def index_pega_get_with_http_info( + async def index_panasonic_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -227124,10 +227124,10 @@ async def index_pega_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination]: - """Return vulnerability data stored in index \"pega\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination]: + """Return vulnerability data stored in index \"panasonic\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pega index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pega Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pega?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pega?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the panasonic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Panasonic Vulnerability Advisory List ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/panasonic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/panasonic?cursor=` :param page: set the page number of the response :type page: int @@ -227199,7 +227199,7 @@ async def index_pega_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pega_get_serialize( + _param = self._index_panasonic_get_serialize( page=page, limit=limit, cursor=cursor, @@ -227231,7 +227231,7 @@ async def index_pega_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination", '404': "str", '500': "str", } @@ -227247,7 +227247,7 @@ async def index_pega_get_with_http_info( @validate_call - async def index_pega_get_without_preload_content( + async def index_panasonic_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -227286,9 +227286,9 @@ async def index_pega_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"pega\" + """Return vulnerability data stored in index \"panasonic\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pega index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pega Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pega?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pega?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the panasonic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Panasonic Vulnerability Advisory List ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/panasonic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/panasonic?cursor=` :param page: set the page number of the response :type page: int @@ -227360,7 +227360,7 @@ async def index_pega_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pega_get_serialize( + _param = self._index_panasonic_get_serialize( page=page, limit=limit, cursor=cursor, @@ -227392,7 +227392,7 @@ async def index_pega_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination", '404': "str", '500': "str", } @@ -227403,7 +227403,7 @@ async def index_pega_get_without_preload_content( return response_data.response - def _index_pega_get_serialize( + def _index_panasonic_get_serialize( self, page, limit, @@ -227571,7 +227571,7 @@ def _index_pega_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/pega', + resource_path='/v3/index/panasonic', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -227588,7 +227588,7 @@ def _index_pega_get_serialize( @validate_call - async def index_philips_get( + async def index_papercut_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -227626,10 +227626,10 @@ async def index_philips_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"philips\" + ) -> RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination: + """Return vulnerability data stored in index \"papercut\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the philips index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Philips Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/philips?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/philips?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the papercut index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PaperCut Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/papercut?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/papercut?cursor=` :param page: set the page number of the response :type page: int @@ -227701,7 +227701,7 @@ async def index_philips_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_philips_get_serialize( + _param = self._index_papercut_get_serialize( page=page, limit=limit, cursor=cursor, @@ -227733,7 +227733,7 @@ async def index_philips_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination", '404': "str", '500': "str", } @@ -227749,7 +227749,7 @@ async def index_philips_get( @validate_call - async def index_philips_get_with_http_info( + async def index_papercut_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -227787,10 +227787,10 @@ async def index_philips_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"philips\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination]: + """Return vulnerability data stored in index \"papercut\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the philips index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Philips Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/philips?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/philips?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the papercut index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PaperCut Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/papercut?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/papercut?cursor=` :param page: set the page number of the response :type page: int @@ -227862,7 +227862,7 @@ async def index_philips_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_philips_get_serialize( + _param = self._index_papercut_get_serialize( page=page, limit=limit, cursor=cursor, @@ -227894,7 +227894,7 @@ async def index_philips_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination", '404': "str", '500': "str", } @@ -227910,7 +227910,7 @@ async def index_philips_get_with_http_info( @validate_call - async def index_philips_get_without_preload_content( + async def index_papercut_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -227949,9 +227949,9 @@ async def index_philips_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"philips\" + """Return vulnerability data stored in index \"papercut\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the philips index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Philips Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/philips?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/philips?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the papercut index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PaperCut Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/papercut?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/papercut?cursor=` :param page: set the page number of the response :type page: int @@ -228023,7 +228023,7 @@ async def index_philips_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_philips_get_serialize( + _param = self._index_papercut_get_serialize( page=page, limit=limit, cursor=cursor, @@ -228055,7 +228055,7 @@ async def index_philips_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination", '404': "str", '500': "str", } @@ -228066,7 +228066,7 @@ async def index_philips_get_without_preload_content( return response_data.response - def _index_philips_get_serialize( + def _index_papercut_get_serialize( self, page, limit, @@ -228234,7 +228234,7 @@ def _index_philips_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/philips', + resource_path='/v3/index/papercut', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -228251,7 +228251,7 @@ def _index_philips_get_serialize( @validate_call - async def index_phoenix_contact_get( + async def index_pega_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -228289,10 +228289,10 @@ async def index_phoenix_contact_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"phoenix-contact\" + ) -> RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination: + """Return vulnerability data stored in index \"pega\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the phoenix-contact index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Phoenix Contact Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/phoenix-contact?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/phoenix-contact?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pega index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pega Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pega?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pega?cursor=` :param page: set the page number of the response :type page: int @@ -228364,7 +228364,7 @@ async def index_phoenix_contact_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_phoenix_contact_get_serialize( + _param = self._index_pega_get_serialize( page=page, limit=limit, cursor=cursor, @@ -228396,7 +228396,7 @@ async def index_phoenix_contact_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination", '404': "str", '500': "str", } @@ -228412,7 +228412,7 @@ async def index_phoenix_contact_get( @validate_call - async def index_phoenix_contact_get_with_http_info( + async def index_pega_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -228450,10 +228450,10 @@ async def index_phoenix_contact_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"phoenix-contact\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination]: + """Return vulnerability data stored in index \"pega\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the phoenix-contact index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Phoenix Contact Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/phoenix-contact?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/phoenix-contact?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pega index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pega Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pega?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pega?cursor=` :param page: set the page number of the response :type page: int @@ -228525,7 +228525,7 @@ async def index_phoenix_contact_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_phoenix_contact_get_serialize( + _param = self._index_pega_get_serialize( page=page, limit=limit, cursor=cursor, @@ -228557,7 +228557,7 @@ async def index_phoenix_contact_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination", '404': "str", '500': "str", } @@ -228573,7 +228573,7 @@ async def index_phoenix_contact_get_with_http_info( @validate_call - async def index_phoenix_contact_get_without_preload_content( + async def index_pega_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -228612,9 +228612,9 @@ async def index_phoenix_contact_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"phoenix-contact\" + """Return vulnerability data stored in index \"pega\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the phoenix-contact index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Phoenix Contact Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/phoenix-contact?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/phoenix-contact?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pega index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pega Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pega?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pega?cursor=` :param page: set the page number of the response :type page: int @@ -228686,7 +228686,7 @@ async def index_phoenix_contact_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_phoenix_contact_get_serialize( + _param = self._index_pega_get_serialize( page=page, limit=limit, cursor=cursor, @@ -228718,7 +228718,7 @@ async def index_phoenix_contact_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination", '404': "str", '500': "str", } @@ -228729,7 +228729,7 @@ async def index_phoenix_contact_get_without_preload_content( return response_data.response - def _index_phoenix_contact_get_serialize( + def _index_pega_get_serialize( self, page, limit, @@ -228897,7 +228897,7 @@ def _index_phoenix_contact_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/phoenix-contact', + resource_path='/v3/index/pega', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -228914,7 +228914,7 @@ def _index_phoenix_contact_get_serialize( @validate_call - async def index_php_my_admin_get( + async def index_philips_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -228952,10 +228952,10 @@ async def index_php_my_admin_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination: - """Return vulnerability data stored in index \"php-my-admin\" + ) -> RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"philips\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the php-my-admin index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** phpMyAdmin Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/php-my-admin?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/php-my-admin?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the philips index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Philips Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/philips?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/philips?cursor=` :param page: set the page number of the response :type page: int @@ -229027,7 +229027,7 @@ async def index_php_my_admin_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_php_my_admin_get_serialize( + _param = self._index_philips_get_serialize( page=page, limit=limit, cursor=cursor, @@ -229059,7 +229059,7 @@ async def index_php_my_admin_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -229075,7 +229075,7 @@ async def index_php_my_admin_get( @validate_call - async def index_php_my_admin_get_with_http_info( + async def index_philips_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -229113,10 +229113,10 @@ async def index_php_my_admin_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination]: - """Return vulnerability data stored in index \"php-my-admin\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"philips\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the php-my-admin index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** phpMyAdmin Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/php-my-admin?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/php-my-admin?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the philips index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Philips Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/philips?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/philips?cursor=` :param page: set the page number of the response :type page: int @@ -229188,7 +229188,7 @@ async def index_php_my_admin_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_php_my_admin_get_serialize( + _param = self._index_philips_get_serialize( page=page, limit=limit, cursor=cursor, @@ -229220,7 +229220,7 @@ async def index_php_my_admin_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -229236,7 +229236,7 @@ async def index_php_my_admin_get_with_http_info( @validate_call - async def index_php_my_admin_get_without_preload_content( + async def index_philips_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -229275,9 +229275,9 @@ async def index_php_my_admin_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"php-my-admin\" + """Return vulnerability data stored in index \"philips\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the php-my-admin index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** phpMyAdmin Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/php-my-admin?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/php-my-admin?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the philips index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Philips Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/philips?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/philips?cursor=` :param page: set the page number of the response :type page: int @@ -229349,7 +229349,7 @@ async def index_php_my_admin_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_php_my_admin_get_serialize( + _param = self._index_philips_get_serialize( page=page, limit=limit, cursor=cursor, @@ -229381,7 +229381,7 @@ async def index_php_my_admin_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -229392,7 +229392,7 @@ async def index_php_my_admin_get_without_preload_content( return response_data.response - def _index_php_my_admin_get_serialize( + def _index_philips_get_serialize( self, page, limit, @@ -229560,7 +229560,7 @@ def _index_php_my_admin_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/php-my-admin', + resource_path='/v3/index/philips', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -229577,7 +229577,7 @@ def _index_php_my_admin_get_serialize( @validate_call - async def index_pkcert_get( + async def index_phoenix_contact_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -229615,10 +229615,10 @@ async def index_pkcert_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination: - """Return vulnerability data stored in index \"pkcert\" + ) -> RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"phoenix-contact\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pkcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PK CERT Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pkcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pkcert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the phoenix-contact index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Phoenix Contact Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/phoenix-contact?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/phoenix-contact?cursor=` :param page: set the page number of the response :type page: int @@ -229690,7 +229690,7 @@ async def index_pkcert_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pkcert_get_serialize( + _param = self._index_phoenix_contact_get_serialize( page=page, limit=limit, cursor=cursor, @@ -229722,7 +229722,7 @@ async def index_pkcert_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -229738,7 +229738,7 @@ async def index_pkcert_get( @validate_call - async def index_pkcert_get_with_http_info( + async def index_phoenix_contact_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -229776,10 +229776,10 @@ async def index_pkcert_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination]: - """Return vulnerability data stored in index \"pkcert\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"phoenix-contact\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pkcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PK CERT Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pkcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pkcert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the phoenix-contact index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Phoenix Contact Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/phoenix-contact?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/phoenix-contact?cursor=` :param page: set the page number of the response :type page: int @@ -229851,7 +229851,7 @@ async def index_pkcert_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pkcert_get_serialize( + _param = self._index_phoenix_contact_get_serialize( page=page, limit=limit, cursor=cursor, @@ -229883,7 +229883,7 @@ async def index_pkcert_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -229899,7 +229899,7 @@ async def index_pkcert_get_with_http_info( @validate_call - async def index_pkcert_get_without_preload_content( + async def index_phoenix_contact_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -229938,9 +229938,9 @@ async def index_pkcert_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"pkcert\" + """Return vulnerability data stored in index \"phoenix-contact\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pkcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PK CERT Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pkcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pkcert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the phoenix-contact index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Phoenix Contact Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/phoenix-contact?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/phoenix-contact?cursor=` :param page: set the page number of the response :type page: int @@ -230012,7 +230012,7 @@ async def index_pkcert_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pkcert_get_serialize( + _param = self._index_phoenix_contact_get_serialize( page=page, limit=limit, cursor=cursor, @@ -230044,7 +230044,7 @@ async def index_pkcert_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -230055,7 +230055,7 @@ async def index_pkcert_get_without_preload_content( return response_data.response - def _index_pkcert_get_serialize( + def _index_phoenix_contact_get_serialize( self, page, limit, @@ -230223,7 +230223,7 @@ def _index_pkcert_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/pkcert', + resource_path='/v3/index/phoenix-contact', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -230240,7 +230240,7 @@ def _index_pkcert_get_serialize( @validate_call - async def index_postgressql_get( + async def index_php_my_admin_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -230278,10 +230278,10 @@ async def index_postgressql_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination: - """Return vulnerability data stored in index \"postgressql\" + ) -> RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination: + """Return vulnerability data stored in index \"php-my-admin\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the postgressql index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PostgresSQL Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/postgressql?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/postgressql?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the php-my-admin index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** phpMyAdmin Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/php-my-admin?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/php-my-admin?cursor=` :param page: set the page number of the response :type page: int @@ -230353,7 +230353,7 @@ async def index_postgressql_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_postgressql_get_serialize( + _param = self._index_php_my_admin_get_serialize( page=page, limit=limit, cursor=cursor, @@ -230385,7 +230385,7 @@ async def index_postgressql_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination", '404': "str", '500': "str", } @@ -230401,7 +230401,7 @@ async def index_postgressql_get( @validate_call - async def index_postgressql_get_with_http_info( + async def index_php_my_admin_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -230439,10 +230439,10 @@ async def index_postgressql_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination]: - """Return vulnerability data stored in index \"postgressql\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination]: + """Return vulnerability data stored in index \"php-my-admin\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the postgressql index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PostgresSQL Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/postgressql?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/postgressql?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the php-my-admin index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** phpMyAdmin Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/php-my-admin?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/php-my-admin?cursor=` :param page: set the page number of the response :type page: int @@ -230514,7 +230514,7 @@ async def index_postgressql_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_postgressql_get_serialize( + _param = self._index_php_my_admin_get_serialize( page=page, limit=limit, cursor=cursor, @@ -230546,7 +230546,7 @@ async def index_postgressql_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination", '404': "str", '500': "str", } @@ -230562,7 +230562,7 @@ async def index_postgressql_get_with_http_info( @validate_call - async def index_postgressql_get_without_preload_content( + async def index_php_my_admin_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -230601,9 +230601,9 @@ async def index_postgressql_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"postgressql\" + """Return vulnerability data stored in index \"php-my-admin\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the postgressql index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PostgresSQL Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/postgressql?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/postgressql?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the php-my-admin index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** phpMyAdmin Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/php-my-admin?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/php-my-admin?cursor=` :param page: set the page number of the response :type page: int @@ -230675,7 +230675,7 @@ async def index_postgressql_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_postgressql_get_serialize( + _param = self._index_php_my_admin_get_serialize( page=page, limit=limit, cursor=cursor, @@ -230707,7 +230707,7 @@ async def index_postgressql_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination", '404': "str", '500': "str", } @@ -230718,7 +230718,7 @@ async def index_postgressql_get_without_preload_content( return response_data.response - def _index_postgressql_get_serialize( + def _index_php_my_admin_get_serialize( self, page, limit, @@ -230886,7 +230886,7 @@ def _index_postgressql_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/postgressql', + resource_path='/v3/index/php-my-admin', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -230903,7 +230903,7 @@ def _index_postgressql_get_serialize( @validate_call - async def index_powerdns_get( + async def index_pkcert_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -230941,10 +230941,10 @@ async def index_powerdns_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination: - """Return vulnerability data stored in index \"powerdns\" + ) -> RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination: + """Return vulnerability data stored in index \"pkcert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the powerdns index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PowerDNS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/powerdns?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/powerdns?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pkcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PK CERT Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pkcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pkcert?cursor=` :param page: set the page number of the response :type page: int @@ -231016,7 +231016,7 @@ async def index_powerdns_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_powerdns_get_serialize( + _param = self._index_pkcert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -231048,7 +231048,7 @@ async def index_powerdns_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination", '404': "str", '500': "str", } @@ -231064,7 +231064,7 @@ async def index_powerdns_get( @validate_call - async def index_powerdns_get_with_http_info( + async def index_pkcert_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -231102,10 +231102,10 @@ async def index_powerdns_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination]: - """Return vulnerability data stored in index \"powerdns\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination]: + """Return vulnerability data stored in index \"pkcert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the powerdns index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PowerDNS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/powerdns?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/powerdns?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pkcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PK CERT Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pkcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pkcert?cursor=` :param page: set the page number of the response :type page: int @@ -231177,7 +231177,7 @@ async def index_powerdns_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_powerdns_get_serialize( + _param = self._index_pkcert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -231209,7 +231209,7 @@ async def index_powerdns_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination", '404': "str", '500': "str", } @@ -231225,7 +231225,7 @@ async def index_powerdns_get_with_http_info( @validate_call - async def index_powerdns_get_without_preload_content( + async def index_pkcert_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -231264,9 +231264,9 @@ async def index_powerdns_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"powerdns\" + """Return vulnerability data stored in index \"pkcert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the powerdns index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PowerDNS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/powerdns?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/powerdns?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pkcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PK CERT Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pkcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pkcert?cursor=` :param page: set the page number of the response :type page: int @@ -231338,7 +231338,7 @@ async def index_powerdns_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_powerdns_get_serialize( + _param = self._index_pkcert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -231370,7 +231370,7 @@ async def index_powerdns_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination", '404': "str", '500': "str", } @@ -231381,7 +231381,7 @@ async def index_powerdns_get_without_preload_content( return response_data.response - def _index_powerdns_get_serialize( + def _index_pkcert_get_serialize( self, page, limit, @@ -231549,7 +231549,7 @@ def _index_powerdns_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/powerdns', + resource_path='/v3/index/pkcert', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -231566,7 +231566,7 @@ def _index_powerdns_get_serialize( @validate_call - async def index_progress_get( + async def index_postgressql_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -231604,10 +231604,10 @@ async def index_progress_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination: - """Return vulnerability data stored in index \"progress\" + ) -> RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination: + """Return vulnerability data stored in index \"postgressql\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the progress index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Progress Product Alert Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/progress?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/progress?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the postgressql index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PostgresSQL Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/postgressql?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/postgressql?cursor=` :param page: set the page number of the response :type page: int @@ -231679,7 +231679,7 @@ async def index_progress_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_progress_get_serialize( + _param = self._index_postgressql_get_serialize( page=page, limit=limit, cursor=cursor, @@ -231711,7 +231711,7 @@ async def index_progress_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination", '404': "str", '500': "str", } @@ -231727,7 +231727,7 @@ async def index_progress_get( @validate_call - async def index_progress_get_with_http_info( + async def index_postgressql_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -231765,10 +231765,10 @@ async def index_progress_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination]: - """Return vulnerability data stored in index \"progress\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination]: + """Return vulnerability data stored in index \"postgressql\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the progress index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Progress Product Alert Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/progress?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/progress?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the postgressql index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PostgresSQL Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/postgressql?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/postgressql?cursor=` :param page: set the page number of the response :type page: int @@ -231840,7 +231840,7 @@ async def index_progress_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_progress_get_serialize( + _param = self._index_postgressql_get_serialize( page=page, limit=limit, cursor=cursor, @@ -231872,7 +231872,7 @@ async def index_progress_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination", '404': "str", '500': "str", } @@ -231888,7 +231888,7 @@ async def index_progress_get_with_http_info( @validate_call - async def index_progress_get_without_preload_content( + async def index_postgressql_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -231927,9 +231927,9 @@ async def index_progress_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"progress\" + """Return vulnerability data stored in index \"postgressql\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the progress index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Progress Product Alert Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/progress?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/progress?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the postgressql index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PostgresSQL Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/postgressql?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/postgressql?cursor=` :param page: set the page number of the response :type page: int @@ -232001,7 +232001,7 @@ async def index_progress_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_progress_get_serialize( + _param = self._index_postgressql_get_serialize( page=page, limit=limit, cursor=cursor, @@ -232033,7 +232033,7 @@ async def index_progress_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination", '404': "str", '500': "str", } @@ -232044,7 +232044,7 @@ async def index_progress_get_without_preload_content( return response_data.response - def _index_progress_get_serialize( + def _index_postgressql_get_serialize( self, page, limit, @@ -232212,7 +232212,7 @@ def _index_progress_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/progress', + resource_path='/v3/index/postgressql', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -232229,7 +232229,7 @@ def _index_progress_get_serialize( @validate_call - async def index_proofpoint_get( + async def index_powerdns_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -232267,10 +232267,10 @@ async def index_proofpoint_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination: - """Return vulnerability data stored in index \"proofpoint\" + ) -> RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination: + """Return vulnerability data stored in index \"powerdns\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the proofpoint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Proofpoint Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/proofpoint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/proofpoint?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the powerdns index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PowerDNS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/powerdns?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/powerdns?cursor=` :param page: set the page number of the response :type page: int @@ -232342,7 +232342,7 @@ async def index_proofpoint_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_proofpoint_get_serialize( + _param = self._index_powerdns_get_serialize( page=page, limit=limit, cursor=cursor, @@ -232374,7 +232374,7 @@ async def index_proofpoint_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination", '404': "str", '500': "str", } @@ -232390,7 +232390,7 @@ async def index_proofpoint_get( @validate_call - async def index_proofpoint_get_with_http_info( + async def index_powerdns_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -232428,10 +232428,10 @@ async def index_proofpoint_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination]: - """Return vulnerability data stored in index \"proofpoint\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination]: + """Return vulnerability data stored in index \"powerdns\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the proofpoint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Proofpoint Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/proofpoint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/proofpoint?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the powerdns index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PowerDNS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/powerdns?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/powerdns?cursor=` :param page: set the page number of the response :type page: int @@ -232503,7 +232503,7 @@ async def index_proofpoint_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_proofpoint_get_serialize( + _param = self._index_powerdns_get_serialize( page=page, limit=limit, cursor=cursor, @@ -232535,7 +232535,7 @@ async def index_proofpoint_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination", '404': "str", '500': "str", } @@ -232551,7 +232551,7 @@ async def index_proofpoint_get_with_http_info( @validate_call - async def index_proofpoint_get_without_preload_content( + async def index_powerdns_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -232590,9 +232590,9 @@ async def index_proofpoint_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"proofpoint\" + """Return vulnerability data stored in index \"powerdns\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the proofpoint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Proofpoint Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/proofpoint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/proofpoint?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the powerdns index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PowerDNS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/powerdns?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/powerdns?cursor=` :param page: set the page number of the response :type page: int @@ -232664,7 +232664,7 @@ async def index_proofpoint_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_proofpoint_get_serialize( + _param = self._index_powerdns_get_serialize( page=page, limit=limit, cursor=cursor, @@ -232696,7 +232696,7 @@ async def index_proofpoint_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination", '404': "str", '500': "str", } @@ -232707,7 +232707,7 @@ async def index_proofpoint_get_without_preload_content( return response_data.response - def _index_proofpoint_get_serialize( + def _index_powerdns_get_serialize( self, page, limit, @@ -232875,7 +232875,7 @@ def _index_proofpoint_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/proofpoint', + resource_path='/v3/index/powerdns', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -232892,7 +232892,7 @@ def _index_proofpoint_get_serialize( @validate_call - async def index_ptc_get( + async def index_progress_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -232930,10 +232930,10 @@ async def index_ptc_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination: - """Return vulnerability data stored in index \"ptc\" + ) -> RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination: + """Return vulnerability data stored in index \"progress\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ptc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PTC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ptc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ptc?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the progress index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Progress Product Alert Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/progress?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/progress?cursor=` :param page: set the page number of the response :type page: int @@ -233005,7 +233005,7 @@ async def index_ptc_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ptc_get_serialize( + _param = self._index_progress_get_serialize( page=page, limit=limit, cursor=cursor, @@ -233037,7 +233037,7 @@ async def index_ptc_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination", '404': "str", '500': "str", } @@ -233053,7 +233053,7 @@ async def index_ptc_get( @validate_call - async def index_ptc_get_with_http_info( + async def index_progress_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -233091,10 +233091,10 @@ async def index_ptc_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination]: - """Return vulnerability data stored in index \"ptc\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination]: + """Return vulnerability data stored in index \"progress\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ptc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PTC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ptc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ptc?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the progress index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Progress Product Alert Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/progress?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/progress?cursor=` :param page: set the page number of the response :type page: int @@ -233166,7 +233166,7 @@ async def index_ptc_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ptc_get_serialize( + _param = self._index_progress_get_serialize( page=page, limit=limit, cursor=cursor, @@ -233198,7 +233198,7 @@ async def index_ptc_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination", '404': "str", '500': "str", } @@ -233214,7 +233214,7 @@ async def index_ptc_get_with_http_info( @validate_call - async def index_ptc_get_without_preload_content( + async def index_progress_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -233253,9 +233253,9 @@ async def index_ptc_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ptc\" + """Return vulnerability data stored in index \"progress\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ptc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PTC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ptc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ptc?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the progress index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Progress Product Alert Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/progress?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/progress?cursor=` :param page: set the page number of the response :type page: int @@ -233327,7 +233327,7 @@ async def index_ptc_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ptc_get_serialize( + _param = self._index_progress_get_serialize( page=page, limit=limit, cursor=cursor, @@ -233359,7 +233359,7 @@ async def index_ptc_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination", '404': "str", '500': "str", } @@ -233370,7 +233370,7 @@ async def index_ptc_get_without_preload_content( return response_data.response - def _index_ptc_get_serialize( + def _index_progress_get_serialize( self, page, limit, @@ -233538,7 +233538,7 @@ def _index_ptc_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ptc', + resource_path='/v3/index/progress', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -233555,7 +233555,7 @@ def _index_ptc_get_serialize( @validate_call - async def index_pub_get( + async def index_proofpoint_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -233593,10 +233593,10 @@ async def index_pub_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: - """Return vulnerability data stored in index \"pub\" + ) -> RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination: + """Return vulnerability data stored in index \"proofpoint\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pub index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pub (Dart/Flutter) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pub?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pub?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the proofpoint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Proofpoint Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/proofpoint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/proofpoint?cursor=` :param page: set the page number of the response :type page: int @@ -233668,7 +233668,7 @@ async def index_pub_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pub_get_serialize( + _param = self._index_proofpoint_get_serialize( page=page, limit=limit, cursor=cursor, @@ -233700,7 +233700,7 @@ async def index_pub_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination", '404': "str", '500': "str", } @@ -233716,7 +233716,7 @@ async def index_pub_get( @validate_call - async def index_pub_get_with_http_info( + async def index_proofpoint_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -233754,10 +233754,10 @@ async def index_pub_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: - """Return vulnerability data stored in index \"pub\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination]: + """Return vulnerability data stored in index \"proofpoint\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pub index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pub (Dart/Flutter) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pub?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pub?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the proofpoint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Proofpoint Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/proofpoint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/proofpoint?cursor=` :param page: set the page number of the response :type page: int @@ -233829,7 +233829,7 @@ async def index_pub_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pub_get_serialize( + _param = self._index_proofpoint_get_serialize( page=page, limit=limit, cursor=cursor, @@ -233861,7 +233861,7 @@ async def index_pub_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination", '404': "str", '500': "str", } @@ -233877,7 +233877,7 @@ async def index_pub_get_with_http_info( @validate_call - async def index_pub_get_without_preload_content( + async def index_proofpoint_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -233916,9 +233916,9 @@ async def index_pub_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"pub\" + """Return vulnerability data stored in index \"proofpoint\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pub index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pub (Dart/Flutter) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pub?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pub?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the proofpoint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Proofpoint Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/proofpoint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/proofpoint?cursor=` :param page: set the page number of the response :type page: int @@ -233990,7 +233990,7 @@ async def index_pub_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pub_get_serialize( + _param = self._index_proofpoint_get_serialize( page=page, limit=limit, cursor=cursor, @@ -234022,7 +234022,7 @@ async def index_pub_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination", '404': "str", '500': "str", } @@ -234033,7 +234033,7 @@ async def index_pub_get_without_preload_content( return response_data.response - def _index_pub_get_serialize( + def _index_proofpoint_get_serialize( self, page, limit, @@ -234201,7 +234201,7 @@ def _index_pub_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/pub', + resource_path='/v3/index/proofpoint', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -234218,7 +234218,7 @@ def _index_pub_get_serialize( @validate_call - async def index_pure_storage_get( + async def index_ptc_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -234256,10 +234256,10 @@ async def index_pure_storage_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination: - """Return vulnerability data stored in index \"pure-storage\" + ) -> RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination: + """Return vulnerability data stored in index \"ptc\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pure-storage index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pure Storage Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pure-storage?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pure-storage?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ptc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PTC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ptc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ptc?cursor=` :param page: set the page number of the response :type page: int @@ -234331,7 +234331,7 @@ async def index_pure_storage_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pure_storage_get_serialize( + _param = self._index_ptc_get_serialize( page=page, limit=limit, cursor=cursor, @@ -234363,7 +234363,7 @@ async def index_pure_storage_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination", '404': "str", '500': "str", } @@ -234379,7 +234379,7 @@ async def index_pure_storage_get( @validate_call - async def index_pure_storage_get_with_http_info( + async def index_ptc_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -234417,10 +234417,10 @@ async def index_pure_storage_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination]: - """Return vulnerability data stored in index \"pure-storage\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination]: + """Return vulnerability data stored in index \"ptc\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pure-storage index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pure Storage Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pure-storage?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pure-storage?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ptc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PTC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ptc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ptc?cursor=` :param page: set the page number of the response :type page: int @@ -234492,7 +234492,7 @@ async def index_pure_storage_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pure_storage_get_serialize( + _param = self._index_ptc_get_serialize( page=page, limit=limit, cursor=cursor, @@ -234524,7 +234524,7 @@ async def index_pure_storage_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination", '404': "str", '500': "str", } @@ -234540,7 +234540,7 @@ async def index_pure_storage_get_with_http_info( @validate_call - async def index_pure_storage_get_without_preload_content( + async def index_ptc_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -234579,9 +234579,9 @@ async def index_pure_storage_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"pure-storage\" + """Return vulnerability data stored in index \"ptc\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pure-storage index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pure Storage Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pure-storage?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pure-storage?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ptc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PTC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ptc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ptc?cursor=` :param page: set the page number of the response :type page: int @@ -234653,7 +234653,7 @@ async def index_pure_storage_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pure_storage_get_serialize( + _param = self._index_ptc_get_serialize( page=page, limit=limit, cursor=cursor, @@ -234685,7 +234685,7 @@ async def index_pure_storage_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination", '404': "str", '500': "str", } @@ -234696,7 +234696,7 @@ async def index_pure_storage_get_without_preload_content( return response_data.response - def _index_pure_storage_get_serialize( + def _index_ptc_get_serialize( self, page, limit, @@ -234864,7 +234864,7 @@ def _index_pure_storage_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/pure-storage', + resource_path='/v3/index/ptc', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -234881,7 +234881,7 @@ def _index_pure_storage_get_serialize( @validate_call - async def index_pypa_advisories_get( + async def index_pub_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -234919,10 +234919,10 @@ async def index_pypa_advisories_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"pypa-advisories\" + ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: + """Return vulnerability data stored in index \"pub\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypa-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPA Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypa-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypa-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pub index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pub (Dart/Flutter) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pub?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pub?cursor=` :param page: set the page number of the response :type page: int @@ -234994,7 +234994,7 @@ async def index_pypa_advisories_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pypa_advisories_get_serialize( + _param = self._index_pub_get_serialize( page=page, limit=limit, cursor=cursor, @@ -235026,7 +235026,7 @@ async def index_pypa_advisories_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -235042,7 +235042,7 @@ async def index_pypa_advisories_get( @validate_call - async def index_pypa_advisories_get_with_http_info( + async def index_pub_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -235080,10 +235080,10 @@ async def index_pypa_advisories_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"pypa-advisories\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: + """Return vulnerability data stored in index \"pub\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypa-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPA Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypa-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypa-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pub index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pub (Dart/Flutter) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pub?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pub?cursor=` :param page: set the page number of the response :type page: int @@ -235155,7 +235155,7 @@ async def index_pypa_advisories_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pypa_advisories_get_serialize( + _param = self._index_pub_get_serialize( page=page, limit=limit, cursor=cursor, @@ -235187,7 +235187,7 @@ async def index_pypa_advisories_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -235203,7 +235203,7 @@ async def index_pypa_advisories_get_with_http_info( @validate_call - async def index_pypa_advisories_get_without_preload_content( + async def index_pub_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -235242,9 +235242,9 @@ async def index_pypa_advisories_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"pypa-advisories\" + """Return vulnerability data stored in index \"pub\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypa-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPA Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypa-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypa-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pub index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pub (Dart/Flutter) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pub?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pub?cursor=` :param page: set the page number of the response :type page: int @@ -235316,7 +235316,7 @@ async def index_pypa_advisories_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pypa_advisories_get_serialize( + _param = self._index_pub_get_serialize( page=page, limit=limit, cursor=cursor, @@ -235348,7 +235348,7 @@ async def index_pypa_advisories_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -235359,7 +235359,7 @@ async def index_pypa_advisories_get_without_preload_content( return response_data.response - def _index_pypa_advisories_get_serialize( + def _index_pub_get_serialize( self, page, limit, @@ -235527,7 +235527,7 @@ def _index_pypa_advisories_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/pypa-advisories', + resource_path='/v3/index/pub', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -235544,7 +235544,7 @@ def _index_pypa_advisories_get_serialize( @validate_call - async def index_pypi_get( + async def index_pure_storage_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -235582,10 +235582,10 @@ async def index_pypi_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: - """Return vulnerability data stored in index \"pypi\" + ) -> RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination: + """Return vulnerability data stored in index \"pure-storage\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPi (Python) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypi?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pure-storage index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pure Storage Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pure-storage?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pure-storage?cursor=` :param page: set the page number of the response :type page: int @@ -235657,7 +235657,7 @@ async def index_pypi_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pypi_get_serialize( + _param = self._index_pure_storage_get_serialize( page=page, limit=limit, cursor=cursor, @@ -235689,7 +235689,7 @@ async def index_pypi_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination", '404': "str", '500': "str", } @@ -235705,7 +235705,7 @@ async def index_pypi_get( @validate_call - async def index_pypi_get_with_http_info( + async def index_pure_storage_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -235743,10 +235743,10 @@ async def index_pypi_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: - """Return vulnerability data stored in index \"pypi\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination]: + """Return vulnerability data stored in index \"pure-storage\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPi (Python) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypi?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pure-storage index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pure Storage Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pure-storage?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pure-storage?cursor=` :param page: set the page number of the response :type page: int @@ -235818,7 +235818,7 @@ async def index_pypi_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pypi_get_serialize( + _param = self._index_pure_storage_get_serialize( page=page, limit=limit, cursor=cursor, @@ -235850,7 +235850,7 @@ async def index_pypi_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination", '404': "str", '500': "str", } @@ -235866,7 +235866,7 @@ async def index_pypi_get_with_http_info( @validate_call - async def index_pypi_get_without_preload_content( + async def index_pure_storage_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -235905,9 +235905,9 @@ async def index_pypi_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"pypi\" + """Return vulnerability data stored in index \"pure-storage\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPi (Python) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypi?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pure-storage index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pure Storage Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pure-storage?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pure-storage?cursor=` :param page: set the page number of the response :type page: int @@ -235979,7 +235979,7 @@ async def index_pypi_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pypi_get_serialize( + _param = self._index_pure_storage_get_serialize( page=page, limit=limit, cursor=cursor, @@ -236011,7 +236011,7 @@ async def index_pypi_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination", '404': "str", '500': "str", } @@ -236022,7 +236022,7 @@ async def index_pypi_get_without_preload_content( return response_data.response - def _index_pypi_get_serialize( + def _index_pure_storage_get_serialize( self, page, limit, @@ -236190,7 +236190,7 @@ def _index_pypi_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/pypi', + resource_path='/v3/index/pure-storage', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -236207,7 +236207,7 @@ def _index_pypi_get_serialize( @validate_call - async def index_qnap_get( + async def index_pypa_advisories_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -236245,10 +236245,10 @@ async def index_qnap_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"qnap\" + ) -> RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"pypa-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qnap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** QNAP Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qnap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qnap?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypa-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPA Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypa-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypa-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -236320,7 +236320,7 @@ async def index_qnap_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qnap_get_serialize( + _param = self._index_pypa_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -236352,7 +236352,7 @@ async def index_qnap_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -236368,7 +236368,7 @@ async def index_qnap_get( @validate_call - async def index_qnap_get_with_http_info( + async def index_pypa_advisories_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -236406,10 +236406,10 @@ async def index_qnap_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"qnap\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"pypa-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qnap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** QNAP Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qnap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qnap?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypa-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPA Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypa-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypa-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -236481,7 +236481,7 @@ async def index_qnap_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qnap_get_serialize( + _param = self._index_pypa_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -236513,7 +236513,7 @@ async def index_qnap_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -236529,7 +236529,7 @@ async def index_qnap_get_with_http_info( @validate_call - async def index_qnap_get_without_preload_content( + async def index_pypa_advisories_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -236568,9 +236568,9 @@ async def index_qnap_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"qnap\" + """Return vulnerability data stored in index \"pypa-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qnap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** QNAP Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qnap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qnap?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypa-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPA Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypa-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypa-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -236642,7 +236642,7 @@ async def index_qnap_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qnap_get_serialize( + _param = self._index_pypa_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -236674,7 +236674,7 @@ async def index_qnap_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -236685,7 +236685,7 @@ async def index_qnap_get_without_preload_content( return response_data.response - def _index_qnap_get_serialize( + def _index_pypa_advisories_get_serialize( self, page, limit, @@ -236853,7 +236853,7 @@ def _index_qnap_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/qnap', + resource_path='/v3/index/pypa-advisories', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -236870,7 +236870,7 @@ def _index_qnap_get_serialize( @validate_call - async def index_qqids_get( + async def index_pypi_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -236908,10 +236908,10 @@ async def index_qqids_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination: - """Return vulnerability data stored in index \"qqids\" + ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: + """Return vulnerability data stored in index \"pypi\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qqids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QIDs ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qqids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qqids?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPi (Python) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypi?cursor=` :param page: set the page number of the response :type page: int @@ -236983,7 +236983,7 @@ async def index_qqids_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qqids_get_serialize( + _param = self._index_pypi_get_serialize( page=page, limit=limit, cursor=cursor, @@ -237015,7 +237015,7 @@ async def index_qqids_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -237031,7 +237031,7 @@ async def index_qqids_get( @validate_call - async def index_qqids_get_with_http_info( + async def index_pypi_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -237069,10 +237069,10 @@ async def index_qqids_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination]: - """Return vulnerability data stored in index \"qqids\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: + """Return vulnerability data stored in index \"pypi\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qqids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QIDs ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qqids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qqids?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPi (Python) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypi?cursor=` :param page: set the page number of the response :type page: int @@ -237144,7 +237144,7 @@ async def index_qqids_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qqids_get_serialize( + _param = self._index_pypi_get_serialize( page=page, limit=limit, cursor=cursor, @@ -237176,7 +237176,7 @@ async def index_qqids_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -237192,7 +237192,7 @@ async def index_qqids_get_with_http_info( @validate_call - async def index_qqids_get_without_preload_content( + async def index_pypi_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -237231,9 +237231,9 @@ async def index_qqids_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"qqids\" + """Return vulnerability data stored in index \"pypi\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qqids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QIDs ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qqids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qqids?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPi (Python) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypi?cursor=` :param page: set the page number of the response :type page: int @@ -237305,7 +237305,7 @@ async def index_qqids_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qqids_get_serialize( + _param = self._index_pypi_get_serialize( page=page, limit=limit, cursor=cursor, @@ -237337,7 +237337,7 @@ async def index_qqids_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -237348,7 +237348,7 @@ async def index_qqids_get_without_preload_content( return response_data.response - def _index_qqids_get_serialize( + def _index_pypi_get_serialize( self, page, limit, @@ -237516,7 +237516,7 @@ def _index_qqids_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/qqids', + resource_path='/v3/index/pypi', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -237533,7 +237533,7 @@ def _index_qqids_get_serialize( @validate_call - async def index_qualcomm_get( + async def index_qnap_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -237571,10 +237571,10 @@ async def index_qualcomm_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination: - """Return vulnerability data stored in index \"qualcomm\" + ) -> RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"qnap\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualcomm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualcomm Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualcomm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualcomm?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qnap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** QNAP Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qnap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qnap?cursor=` :param page: set the page number of the response :type page: int @@ -237646,7 +237646,7 @@ async def index_qualcomm_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qualcomm_get_serialize( + _param = self._index_qnap_get_serialize( page=page, limit=limit, cursor=cursor, @@ -237678,7 +237678,7 @@ async def index_qualcomm_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -237694,7 +237694,7 @@ async def index_qualcomm_get( @validate_call - async def index_qualcomm_get_with_http_info( + async def index_qnap_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -237732,10 +237732,10 @@ async def index_qualcomm_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination]: - """Return vulnerability data stored in index \"qualcomm\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"qnap\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualcomm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualcomm Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualcomm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualcomm?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qnap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** QNAP Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qnap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qnap?cursor=` :param page: set the page number of the response :type page: int @@ -237807,7 +237807,7 @@ async def index_qualcomm_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qualcomm_get_serialize( + _param = self._index_qnap_get_serialize( page=page, limit=limit, cursor=cursor, @@ -237839,7 +237839,7 @@ async def index_qualcomm_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -237855,7 +237855,7 @@ async def index_qualcomm_get_with_http_info( @validate_call - async def index_qualcomm_get_without_preload_content( + async def index_qnap_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -237894,9 +237894,9 @@ async def index_qualcomm_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"qualcomm\" + """Return vulnerability data stored in index \"qnap\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualcomm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualcomm Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualcomm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualcomm?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qnap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** QNAP Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qnap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qnap?cursor=` :param page: set the page number of the response :type page: int @@ -237968,7 +237968,7 @@ async def index_qualcomm_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qualcomm_get_serialize( + _param = self._index_qnap_get_serialize( page=page, limit=limit, cursor=cursor, @@ -238000,7 +238000,7 @@ async def index_qualcomm_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -238011,7 +238011,7 @@ async def index_qualcomm_get_without_preload_content( return response_data.response - def _index_qualcomm_get_serialize( + def _index_qnap_get_serialize( self, page, limit, @@ -238179,7 +238179,7 @@ def _index_qualcomm_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/qualcomm', + resource_path='/v3/index/qnap', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -238196,7 +238196,7 @@ def _index_qualcomm_get_serialize( @validate_call - async def index_qualys_get( + async def index_qqids_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -238234,10 +238234,10 @@ async def index_qualys_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination: - """Return vulnerability data stored in index \"qualys\" + ) -> RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination: + """Return vulnerability data stored in index \"qqids\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qqids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QIDs ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qqids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qqids?cursor=` :param page: set the page number of the response :type page: int @@ -238309,7 +238309,7 @@ async def index_qualys_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qualys_get_serialize( + _param = self._index_qqids_get_serialize( page=page, limit=limit, cursor=cursor, @@ -238341,7 +238341,7 @@ async def index_qualys_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination", '404': "str", '500': "str", } @@ -238357,7 +238357,7 @@ async def index_qualys_get( @validate_call - async def index_qualys_get_with_http_info( + async def index_qqids_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -238395,10 +238395,10 @@ async def index_qualys_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination]: - """Return vulnerability data stored in index \"qualys\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination]: + """Return vulnerability data stored in index \"qqids\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qqids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QIDs ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qqids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qqids?cursor=` :param page: set the page number of the response :type page: int @@ -238470,7 +238470,7 @@ async def index_qualys_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qualys_get_serialize( + _param = self._index_qqids_get_serialize( page=page, limit=limit, cursor=cursor, @@ -238502,7 +238502,7 @@ async def index_qualys_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination", '404': "str", '500': "str", } @@ -238518,7 +238518,7 @@ async def index_qualys_get_with_http_info( @validate_call - async def index_qualys_get_without_preload_content( + async def index_qqids_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -238557,9 +238557,9 @@ async def index_qualys_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"qualys\" + """Return vulnerability data stored in index \"qqids\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qqids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QIDs ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qqids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qqids?cursor=` :param page: set the page number of the response :type page: int @@ -238631,7 +238631,7 @@ async def index_qualys_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qualys_get_serialize( + _param = self._index_qqids_get_serialize( page=page, limit=limit, cursor=cursor, @@ -238663,7 +238663,7 @@ async def index_qualys_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination", '404': "str", '500': "str", } @@ -238674,7 +238674,7 @@ async def index_qualys_get_without_preload_content( return response_data.response - def _index_qualys_get_serialize( + def _index_qqids_get_serialize( self, page, limit, @@ -238842,7 +238842,7 @@ def _index_qualys_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/qualys', + resource_path='/v3/index/qqids', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -238859,7 +238859,7 @@ def _index_qualys_get_serialize( @validate_call - async def index_qualys_qids_get( + async def index_qualcomm_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -238897,10 +238897,10 @@ async def index_qualys_qids_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination: - """Return vulnerability data stored in index \"qualys-qids\" + ) -> RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination: + """Return vulnerability data stored in index \"qualcomm\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys-qids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QID ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys-qids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys-qids?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualcomm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualcomm Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualcomm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualcomm?cursor=` :param page: set the page number of the response :type page: int @@ -238972,7 +238972,7 @@ async def index_qualys_qids_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qualys_qids_get_serialize( + _param = self._index_qualcomm_get_serialize( page=page, limit=limit, cursor=cursor, @@ -239004,7 +239004,7 @@ async def index_qualys_qids_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination", '404': "str", '500': "str", } @@ -239020,7 +239020,7 @@ async def index_qualys_qids_get( @validate_call - async def index_qualys_qids_get_with_http_info( + async def index_qualcomm_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -239058,10 +239058,10 @@ async def index_qualys_qids_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination]: - """Return vulnerability data stored in index \"qualys-qids\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination]: + """Return vulnerability data stored in index \"qualcomm\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys-qids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QID ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys-qids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys-qids?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualcomm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualcomm Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualcomm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualcomm?cursor=` :param page: set the page number of the response :type page: int @@ -239133,7 +239133,7 @@ async def index_qualys_qids_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qualys_qids_get_serialize( + _param = self._index_qualcomm_get_serialize( page=page, limit=limit, cursor=cursor, @@ -239165,7 +239165,7 @@ async def index_qualys_qids_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination", '404': "str", '500': "str", } @@ -239181,7 +239181,7 @@ async def index_qualys_qids_get_with_http_info( @validate_call - async def index_qualys_qids_get_without_preload_content( + async def index_qualcomm_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -239220,9 +239220,9 @@ async def index_qualys_qids_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"qualys-qids\" + """Return vulnerability data stored in index \"qualcomm\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys-qids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QID ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys-qids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys-qids?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualcomm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualcomm Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualcomm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualcomm?cursor=` :param page: set the page number of the response :type page: int @@ -239294,7 +239294,7 @@ async def index_qualys_qids_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qualys_qids_get_serialize( + _param = self._index_qualcomm_get_serialize( page=page, limit=limit, cursor=cursor, @@ -239326,7 +239326,7 @@ async def index_qualys_qids_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination", '404': "str", '500': "str", } @@ -239337,7 +239337,7 @@ async def index_qualys_qids_get_without_preload_content( return response_data.response - def _index_qualys_qids_get_serialize( + def _index_qualcomm_get_serialize( self, page, limit, @@ -239505,7 +239505,7 @@ def _index_qualys_qids_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/qualys-qids', + resource_path='/v3/index/qualcomm', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -239522,7 +239522,7 @@ def _index_qualys_qids_get_serialize( @validate_call - async def index_qubes_qsb_get( + async def index_qualys_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -239560,10 +239560,10 @@ async def index_qubes_qsb_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination: - """Return vulnerability data stored in index \"qubes-qsb\" + ) -> RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination: + """Return vulnerability data stored in index \"qualys\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qubes-qsb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qubes Security Bulletin ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qubes-qsb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qubes-qsb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys?cursor=` :param page: set the page number of the response :type page: int @@ -239635,7 +239635,7 @@ async def index_qubes_qsb_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qubes_qsb_get_serialize( + _param = self._index_qualys_get_serialize( page=page, limit=limit, cursor=cursor, @@ -239667,7 +239667,7 @@ async def index_qubes_qsb_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination", '404': "str", '500': "str", } @@ -239683,7 +239683,7 @@ async def index_qubes_qsb_get( @validate_call - async def index_qubes_qsb_get_with_http_info( + async def index_qualys_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -239721,10 +239721,10 @@ async def index_qubes_qsb_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination]: - """Return vulnerability data stored in index \"qubes-qsb\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination]: + """Return vulnerability data stored in index \"qualys\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qubes-qsb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qubes Security Bulletin ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qubes-qsb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qubes-qsb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys?cursor=` :param page: set the page number of the response :type page: int @@ -239796,7 +239796,7 @@ async def index_qubes_qsb_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qubes_qsb_get_serialize( + _param = self._index_qualys_get_serialize( page=page, limit=limit, cursor=cursor, @@ -239828,7 +239828,7 @@ async def index_qubes_qsb_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination", '404': "str", '500': "str", } @@ -239844,7 +239844,7 @@ async def index_qubes_qsb_get_with_http_info( @validate_call - async def index_qubes_qsb_get_without_preload_content( + async def index_qualys_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -239883,9 +239883,9 @@ async def index_qubes_qsb_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"qubes-qsb\" + """Return vulnerability data stored in index \"qualys\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qubes-qsb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qubes Security Bulletin ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qubes-qsb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qubes-qsb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys?cursor=` :param page: set the page number of the response :type page: int @@ -239957,7 +239957,7 @@ async def index_qubes_qsb_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qubes_qsb_get_serialize( + _param = self._index_qualys_get_serialize( page=page, limit=limit, cursor=cursor, @@ -239989,7 +239989,7 @@ async def index_qubes_qsb_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination", '404': "str", '500': "str", } @@ -240000,7 +240000,7 @@ async def index_qubes_qsb_get_without_preload_content( return response_data.response - def _index_qubes_qsb_get_serialize( + def _index_qualys_get_serialize( self, page, limit, @@ -240168,7 +240168,7 @@ def _index_qubes_qsb_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/qubes-qsb', + resource_path='/v3/index/qualys', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -240185,7 +240185,7 @@ def _index_qubes_qsb_get_serialize( @validate_call - async def index_ransomware_get( + async def index_qualys_qids_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -240223,10 +240223,10 @@ async def index_ransomware_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination: - """Return vulnerability data stored in index \"ransomware\" + ) -> RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination: + """Return vulnerability data stored in index \"qualys-qids\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ransomware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Ransomware ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ransomware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ransomware?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys-qids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QID ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys-qids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys-qids?cursor=` :param page: set the page number of the response :type page: int @@ -240298,7 +240298,7 @@ async def index_ransomware_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ransomware_get_serialize( + _param = self._index_qualys_qids_get_serialize( page=page, limit=limit, cursor=cursor, @@ -240330,7 +240330,7 @@ async def index_ransomware_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination", '404': "str", '500': "str", } @@ -240346,7 +240346,7 @@ async def index_ransomware_get( @validate_call - async def index_ransomware_get_with_http_info( + async def index_qualys_qids_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -240384,10 +240384,10 @@ async def index_ransomware_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination]: - """Return vulnerability data stored in index \"ransomware\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination]: + """Return vulnerability data stored in index \"qualys-qids\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ransomware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Ransomware ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ransomware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ransomware?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys-qids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QID ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys-qids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys-qids?cursor=` :param page: set the page number of the response :type page: int @@ -240459,7 +240459,7 @@ async def index_ransomware_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ransomware_get_serialize( + _param = self._index_qualys_qids_get_serialize( page=page, limit=limit, cursor=cursor, @@ -240491,7 +240491,7 @@ async def index_ransomware_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination", '404': "str", '500': "str", } @@ -240507,7 +240507,7 @@ async def index_ransomware_get_with_http_info( @validate_call - async def index_ransomware_get_without_preload_content( + async def index_qualys_qids_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -240546,9 +240546,9 @@ async def index_ransomware_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ransomware\" + """Return vulnerability data stored in index \"qualys-qids\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ransomware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Ransomware ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ransomware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ransomware?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys-qids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QID ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys-qids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys-qids?cursor=` :param page: set the page number of the response :type page: int @@ -240620,7 +240620,7 @@ async def index_ransomware_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ransomware_get_serialize( + _param = self._index_qualys_qids_get_serialize( page=page, limit=limit, cursor=cursor, @@ -240652,7 +240652,7 @@ async def index_ransomware_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination", '404': "str", '500': "str", } @@ -240663,7 +240663,7 @@ async def index_ransomware_get_without_preload_content( return response_data.response - def _index_ransomware_get_serialize( + def _index_qualys_qids_get_serialize( self, page, limit, @@ -240831,7 +240831,7 @@ def _index_ransomware_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ransomware', + resource_path='/v3/index/qualys-qids', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -240848,7 +240848,7 @@ def _index_ransomware_get_serialize( @validate_call - async def index_red_lion_get( + async def index_qubes_qsb_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -240886,10 +240886,10 @@ async def index_red_lion_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination: - """Return vulnerability data stored in index \"red-lion\" + ) -> RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination: + """Return vulnerability data stored in index \"qubes-qsb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the red-lion index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Red-Lion Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/red-lion?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/red-lion?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qubes-qsb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qubes Security Bulletin ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qubes-qsb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qubes-qsb?cursor=` :param page: set the page number of the response :type page: int @@ -240961,7 +240961,7 @@ async def index_red_lion_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_red_lion_get_serialize( + _param = self._index_qubes_qsb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -240993,7 +240993,7 @@ async def index_red_lion_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination", '404': "str", '500': "str", } @@ -241009,7 +241009,7 @@ async def index_red_lion_get( @validate_call - async def index_red_lion_get_with_http_info( + async def index_qubes_qsb_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -241047,10 +241047,10 @@ async def index_red_lion_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination]: - """Return vulnerability data stored in index \"red-lion\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination]: + """Return vulnerability data stored in index \"qubes-qsb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the red-lion index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Red-Lion Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/red-lion?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/red-lion?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qubes-qsb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qubes Security Bulletin ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qubes-qsb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qubes-qsb?cursor=` :param page: set the page number of the response :type page: int @@ -241122,7 +241122,7 @@ async def index_red_lion_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_red_lion_get_serialize( + _param = self._index_qubes_qsb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -241154,7 +241154,7 @@ async def index_red_lion_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination", '404': "str", '500': "str", } @@ -241170,7 +241170,7 @@ async def index_red_lion_get_with_http_info( @validate_call - async def index_red_lion_get_without_preload_content( + async def index_qubes_qsb_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -241209,9 +241209,9 @@ async def index_red_lion_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"red-lion\" + """Return vulnerability data stored in index \"qubes-qsb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the red-lion index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Red-Lion Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/red-lion?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/red-lion?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qubes-qsb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qubes Security Bulletin ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qubes-qsb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qubes-qsb?cursor=` :param page: set the page number of the response :type page: int @@ -241283,7 +241283,7 @@ async def index_red_lion_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_red_lion_get_serialize( + _param = self._index_qubes_qsb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -241315,7 +241315,7 @@ async def index_red_lion_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination", '404': "str", '500': "str", } @@ -241326,7 +241326,7 @@ async def index_red_lion_get_without_preload_content( return response_data.response - def _index_red_lion_get_serialize( + def _index_qubes_qsb_get_serialize( self, page, limit, @@ -241494,7 +241494,7 @@ def _index_red_lion_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/red-lion', + resource_path='/v3/index/qubes-qsb', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -241511,7 +241511,7 @@ def _index_red_lion_get_serialize( @validate_call - async def index_redhat_cves_get( + async def index_ransomware_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -241549,10 +241549,10 @@ async def index_redhat_cves_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination: - """Return vulnerability data stored in index \"redhat-cves\" + ) -> RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination: + """Return vulnerability data stored in index \"ransomware\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the redhat-cves index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CSAF data for redhat ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/redhat-cves?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/redhat-cves?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ransomware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Ransomware ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ransomware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ransomware?cursor=` :param page: set the page number of the response :type page: int @@ -241624,7 +241624,7 @@ async def index_redhat_cves_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_redhat_cves_get_serialize( + _param = self._index_ransomware_get_serialize( page=page, limit=limit, cursor=cursor, @@ -241656,7 +241656,7 @@ async def index_redhat_cves_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination", '404': "str", '500': "str", } @@ -241672,7 +241672,7 @@ async def index_redhat_cves_get( @validate_call - async def index_redhat_cves_get_with_http_info( + async def index_ransomware_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -241710,10 +241710,10 @@ async def index_redhat_cves_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination]: - """Return vulnerability data stored in index \"redhat-cves\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination]: + """Return vulnerability data stored in index \"ransomware\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the redhat-cves index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CSAF data for redhat ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/redhat-cves?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/redhat-cves?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ransomware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Ransomware ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ransomware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ransomware?cursor=` :param page: set the page number of the response :type page: int @@ -241785,7 +241785,7 @@ async def index_redhat_cves_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_redhat_cves_get_serialize( + _param = self._index_ransomware_get_serialize( page=page, limit=limit, cursor=cursor, @@ -241817,7 +241817,7 @@ async def index_redhat_cves_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination", '404': "str", '500': "str", } @@ -241833,7 +241833,7 @@ async def index_redhat_cves_get_with_http_info( @validate_call - async def index_redhat_cves_get_without_preload_content( + async def index_ransomware_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -241872,9 +241872,9 @@ async def index_redhat_cves_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"redhat-cves\" + """Return vulnerability data stored in index \"ransomware\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the redhat-cves index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CSAF data for redhat ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/redhat-cves?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/redhat-cves?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ransomware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Ransomware ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ransomware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ransomware?cursor=` :param page: set the page number of the response :type page: int @@ -241946,7 +241946,7 @@ async def index_redhat_cves_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_redhat_cves_get_serialize( + _param = self._index_ransomware_get_serialize( page=page, limit=limit, cursor=cursor, @@ -241978,7 +241978,7 @@ async def index_redhat_cves_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination", '404': "str", '500': "str", } @@ -241989,7 +241989,7 @@ async def index_redhat_cves_get_without_preload_content( return response_data.response - def _index_redhat_cves_get_serialize( + def _index_ransomware_get_serialize( self, page, limit, @@ -242157,7 +242157,7 @@ def _index_redhat_cves_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/redhat-cves', + resource_path='/v3/index/ransomware', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -242174,7 +242174,7 @@ def _index_redhat_cves_get_serialize( @validate_call - async def index_redhat_get( + async def index_red_lion_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -242212,10 +242212,10 @@ async def index_redhat_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination: - """Return vulnerability data stored in index \"redhat\" + ) -> RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination: + """Return vulnerability data stored in index \"red-lion\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the redhat index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Red Hat Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/redhat?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/redhat?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the red-lion index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Red-Lion Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/red-lion?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/red-lion?cursor=` :param page: set the page number of the response :type page: int @@ -242287,7 +242287,7 @@ async def index_redhat_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_redhat_get_serialize( + _param = self._index_red_lion_get_serialize( page=page, limit=limit, cursor=cursor, @@ -242319,7 +242319,7 @@ async def index_redhat_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination", '404': "str", '500': "str", } @@ -242335,7 +242335,7 @@ async def index_redhat_get( @validate_call - async def index_redhat_get_with_http_info( + async def index_red_lion_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -242373,10 +242373,10 @@ async def index_redhat_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination]: - """Return vulnerability data stored in index \"redhat\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination]: + """Return vulnerability data stored in index \"red-lion\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the redhat index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Red Hat Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/redhat?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/redhat?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the red-lion index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Red-Lion Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/red-lion?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/red-lion?cursor=` :param page: set the page number of the response :type page: int @@ -242448,7 +242448,7 @@ async def index_redhat_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_redhat_get_serialize( + _param = self._index_red_lion_get_serialize( page=page, limit=limit, cursor=cursor, @@ -242480,7 +242480,7 @@ async def index_redhat_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination", '404': "str", '500': "str", } @@ -242496,7 +242496,7 @@ async def index_redhat_get_with_http_info( @validate_call - async def index_redhat_get_without_preload_content( + async def index_red_lion_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -242535,9 +242535,9 @@ async def index_redhat_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"redhat\" + """Return vulnerability data stored in index \"red-lion\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the redhat index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Red Hat Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/redhat?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/redhat?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the red-lion index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Red-Lion Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/red-lion?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/red-lion?cursor=` :param page: set the page number of the response :type page: int @@ -242609,7 +242609,7 @@ async def index_redhat_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_redhat_get_serialize( + _param = self._index_red_lion_get_serialize( page=page, limit=limit, cursor=cursor, @@ -242641,7 +242641,7 @@ async def index_redhat_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination", '404': "str", '500': "str", } @@ -242652,7 +242652,7 @@ async def index_redhat_get_without_preload_content( return response_data.response - def _index_redhat_get_serialize( + def _index_red_lion_get_serialize( self, page, limit, @@ -242820,7 +242820,7 @@ def _index_redhat_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/redhat', + resource_path='/v3/index/red-lion', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -242837,7 +242837,7 @@ def _index_redhat_get_serialize( @validate_call - async def index_renesas_get( + async def index_redhat_cves_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -242875,10 +242875,10 @@ async def index_renesas_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination: - """Return vulnerability data stored in index \"renesas\" + ) -> RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination: + """Return vulnerability data stored in index \"redhat-cves\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the renesas index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Renesas Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/renesas?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/renesas?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the redhat-cves index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CSAF data for redhat ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/redhat-cves?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/redhat-cves?cursor=` :param page: set the page number of the response :type page: int @@ -242950,7 +242950,7 @@ async def index_renesas_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_renesas_get_serialize( + _param = self._index_redhat_cves_get_serialize( page=page, limit=limit, cursor=cursor, @@ -242982,7 +242982,7 @@ async def index_renesas_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination", '404': "str", '500': "str", } @@ -242998,7 +242998,7 @@ async def index_renesas_get( @validate_call - async def index_renesas_get_with_http_info( + async def index_redhat_cves_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -243036,10 +243036,10 @@ async def index_renesas_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination]: - """Return vulnerability data stored in index \"renesas\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination]: + """Return vulnerability data stored in index \"redhat-cves\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the renesas index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Renesas Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/renesas?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/renesas?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the redhat-cves index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CSAF data for redhat ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/redhat-cves?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/redhat-cves?cursor=` :param page: set the page number of the response :type page: int @@ -243111,7 +243111,7 @@ async def index_renesas_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_renesas_get_serialize( + _param = self._index_redhat_cves_get_serialize( page=page, limit=limit, cursor=cursor, @@ -243143,7 +243143,7 @@ async def index_renesas_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination", '404': "str", '500': "str", } @@ -243159,7 +243159,7 @@ async def index_renesas_get_with_http_info( @validate_call - async def index_renesas_get_without_preload_content( + async def index_redhat_cves_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -243198,9 +243198,9 @@ async def index_renesas_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"renesas\" + """Return vulnerability data stored in index \"redhat-cves\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the renesas index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Renesas Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/renesas?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/renesas?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the redhat-cves index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CSAF data for redhat ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/redhat-cves?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/redhat-cves?cursor=` :param page: set the page number of the response :type page: int @@ -243272,7 +243272,7 @@ async def index_renesas_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_renesas_get_serialize( + _param = self._index_redhat_cves_get_serialize( page=page, limit=limit, cursor=cursor, @@ -243304,7 +243304,7 @@ async def index_renesas_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination", '404': "str", '500': "str", } @@ -243315,7 +243315,7 @@ async def index_renesas_get_without_preload_content( return response_data.response - def _index_renesas_get_serialize( + def _index_redhat_cves_get_serialize( self, page, limit, @@ -243483,7 +243483,7 @@ def _index_renesas_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/renesas', + resource_path='/v3/index/redhat-cves', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -243500,7 +243500,7 @@ def _index_renesas_get_serialize( @validate_call - async def index_revive_get( + async def index_redhat_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -243538,10 +243538,10 @@ async def index_revive_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination: - """Return vulnerability data stored in index \"revive\" + ) -> RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination: + """Return vulnerability data stored in index \"redhat\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the revive index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Revive Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/revive?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/revive?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the redhat index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Red Hat Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/redhat?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/redhat?cursor=` :param page: set the page number of the response :type page: int @@ -243613,7 +243613,7 @@ async def index_revive_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_revive_get_serialize( + _param = self._index_redhat_get_serialize( page=page, limit=limit, cursor=cursor, @@ -243645,7 +243645,7 @@ async def index_revive_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination", '404': "str", '500': "str", } @@ -243661,7 +243661,7 @@ async def index_revive_get( @validate_call - async def index_revive_get_with_http_info( + async def index_redhat_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -243699,10 +243699,10 @@ async def index_revive_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination]: - """Return vulnerability data stored in index \"revive\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination]: + """Return vulnerability data stored in index \"redhat\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the revive index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Revive Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/revive?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/revive?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the redhat index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Red Hat Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/redhat?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/redhat?cursor=` :param page: set the page number of the response :type page: int @@ -243774,7 +243774,7 @@ async def index_revive_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_revive_get_serialize( + _param = self._index_redhat_get_serialize( page=page, limit=limit, cursor=cursor, @@ -243806,7 +243806,7 @@ async def index_revive_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination", '404': "str", '500': "str", } @@ -243822,7 +243822,7 @@ async def index_revive_get_with_http_info( @validate_call - async def index_revive_get_without_preload_content( + async def index_redhat_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -243861,9 +243861,9 @@ async def index_revive_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"revive\" + """Return vulnerability data stored in index \"redhat\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the revive index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Revive Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/revive?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/revive?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the redhat index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Red Hat Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/redhat?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/redhat?cursor=` :param page: set the page number of the response :type page: int @@ -243935,7 +243935,7 @@ async def index_revive_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_revive_get_serialize( + _param = self._index_redhat_get_serialize( page=page, limit=limit, cursor=cursor, @@ -243967,7 +243967,7 @@ async def index_revive_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination", '404': "str", '500': "str", } @@ -243978,7 +243978,7 @@ async def index_revive_get_without_preload_content( return response_data.response - def _index_revive_get_serialize( + def _index_redhat_get_serialize( self, page, limit, @@ -244146,7 +244146,7 @@ def _index_revive_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/revive', + resource_path='/v3/index/redhat', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -244163,7 +244163,7 @@ def _index_revive_get_serialize( @validate_call - async def index_roche_get( + async def index_renesas_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -244201,10 +244201,10 @@ async def index_roche_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination: - """Return vulnerability data stored in index \"roche\" + ) -> RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination: + """Return vulnerability data stored in index \"renesas\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the roche index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Roche Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/roche?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/roche?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the renesas index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Renesas Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/renesas?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/renesas?cursor=` :param page: set the page number of the response :type page: int @@ -244276,7 +244276,7 @@ async def index_roche_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_roche_get_serialize( + _param = self._index_renesas_get_serialize( page=page, limit=limit, cursor=cursor, @@ -244308,7 +244308,7 @@ async def index_roche_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination", '404': "str", '500': "str", } @@ -244324,7 +244324,7 @@ async def index_roche_get( @validate_call - async def index_roche_get_with_http_info( + async def index_renesas_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -244362,10 +244362,10 @@ async def index_roche_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination]: - """Return vulnerability data stored in index \"roche\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination]: + """Return vulnerability data stored in index \"renesas\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the roche index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Roche Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/roche?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/roche?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the renesas index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Renesas Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/renesas?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/renesas?cursor=` :param page: set the page number of the response :type page: int @@ -244437,7 +244437,7 @@ async def index_roche_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_roche_get_serialize( + _param = self._index_renesas_get_serialize( page=page, limit=limit, cursor=cursor, @@ -244469,7 +244469,7 @@ async def index_roche_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination", '404': "str", '500': "str", } @@ -244485,7 +244485,7 @@ async def index_roche_get_with_http_info( @validate_call - async def index_roche_get_without_preload_content( + async def index_renesas_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -244524,9 +244524,9 @@ async def index_roche_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"roche\" + """Return vulnerability data stored in index \"renesas\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the roche index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Roche Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/roche?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/roche?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the renesas index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Renesas Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/renesas?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/renesas?cursor=` :param page: set the page number of the response :type page: int @@ -244598,7 +244598,7 @@ async def index_roche_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_roche_get_serialize( + _param = self._index_renesas_get_serialize( page=page, limit=limit, cursor=cursor, @@ -244630,7 +244630,7 @@ async def index_roche_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination", '404': "str", '500': "str", } @@ -244641,7 +244641,7 @@ async def index_roche_get_without_preload_content( return response_data.response - def _index_roche_get_serialize( + def _index_renesas_get_serialize( self, page, limit, @@ -244809,7 +244809,7 @@ def _index_roche_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/roche', + resource_path='/v3/index/renesas', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -244826,7 +244826,7 @@ def _index_roche_get_serialize( @validate_call - async def index_rockwell_get( + async def index_revive_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -244864,10 +244864,10 @@ async def index_rockwell_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination: - """Return vulnerability data stored in index \"rockwell\" + ) -> RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination: + """Return vulnerability data stored in index \"revive\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rockwell index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rockwell Automation Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rockwell?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rockwell?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the revive index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Revive Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/revive?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/revive?cursor=` :param page: set the page number of the response :type page: int @@ -244939,7 +244939,7 @@ async def index_rockwell_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rockwell_get_serialize( + _param = self._index_revive_get_serialize( page=page, limit=limit, cursor=cursor, @@ -244971,7 +244971,7 @@ async def index_rockwell_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination", '404': "str", '500': "str", } @@ -244987,7 +244987,7 @@ async def index_rockwell_get( @validate_call - async def index_rockwell_get_with_http_info( + async def index_revive_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -245025,10 +245025,10 @@ async def index_rockwell_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination]: - """Return vulnerability data stored in index \"rockwell\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination]: + """Return vulnerability data stored in index \"revive\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rockwell index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rockwell Automation Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rockwell?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rockwell?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the revive index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Revive Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/revive?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/revive?cursor=` :param page: set the page number of the response :type page: int @@ -245100,7 +245100,7 @@ async def index_rockwell_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rockwell_get_serialize( + _param = self._index_revive_get_serialize( page=page, limit=limit, cursor=cursor, @@ -245132,7 +245132,7 @@ async def index_rockwell_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination", '404': "str", '500': "str", } @@ -245148,7 +245148,7 @@ async def index_rockwell_get_with_http_info( @validate_call - async def index_rockwell_get_without_preload_content( + async def index_revive_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -245187,9 +245187,9 @@ async def index_rockwell_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"rockwell\" + """Return vulnerability data stored in index \"revive\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rockwell index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rockwell Automation Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rockwell?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rockwell?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the revive index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Revive Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/revive?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/revive?cursor=` :param page: set the page number of the response :type page: int @@ -245261,7 +245261,7 @@ async def index_rockwell_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rockwell_get_serialize( + _param = self._index_revive_get_serialize( page=page, limit=limit, cursor=cursor, @@ -245293,7 +245293,7 @@ async def index_rockwell_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination", '404': "str", '500': "str", } @@ -245304,7 +245304,7 @@ async def index_rockwell_get_without_preload_content( return response_data.response - def _index_rockwell_get_serialize( + def _index_revive_get_serialize( self, page, limit, @@ -245472,7 +245472,7 @@ def _index_rockwell_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/rockwell', + resource_path='/v3/index/revive', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -245489,7 +245489,7 @@ def _index_rockwell_get_serialize( @validate_call - async def index_rocky_errata_get( + async def index_roche_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -245527,10 +245527,10 @@ async def index_rocky_errata_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination: - """Return vulnerability data stored in index \"rocky-errata\" + ) -> RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination: + """Return vulnerability data stored in index \"roche\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky-errata index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Errata ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-errata?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky-errata?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the roche index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Roche Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/roche?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/roche?cursor=` :param page: set the page number of the response :type page: int @@ -245602,7 +245602,7 @@ async def index_rocky_errata_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rocky_errata_get_serialize( + _param = self._index_roche_get_serialize( page=page, limit=limit, cursor=cursor, @@ -245634,7 +245634,7 @@ async def index_rocky_errata_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination", '404': "str", '500': "str", } @@ -245650,7 +245650,7 @@ async def index_rocky_errata_get( @validate_call - async def index_rocky_errata_get_with_http_info( + async def index_roche_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -245688,10 +245688,10 @@ async def index_rocky_errata_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination]: - """Return vulnerability data stored in index \"rocky-errata\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination]: + """Return vulnerability data stored in index \"roche\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky-errata index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Errata ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-errata?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky-errata?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the roche index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Roche Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/roche?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/roche?cursor=` :param page: set the page number of the response :type page: int @@ -245763,7 +245763,7 @@ async def index_rocky_errata_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rocky_errata_get_serialize( + _param = self._index_roche_get_serialize( page=page, limit=limit, cursor=cursor, @@ -245795,7 +245795,7 @@ async def index_rocky_errata_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination", '404': "str", '500': "str", } @@ -245811,7 +245811,7 @@ async def index_rocky_errata_get_with_http_info( @validate_call - async def index_rocky_errata_get_without_preload_content( + async def index_roche_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -245850,9 +245850,9 @@ async def index_rocky_errata_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"rocky-errata\" + """Return vulnerability data stored in index \"roche\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky-errata index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Errata ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-errata?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky-errata?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the roche index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Roche Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/roche?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/roche?cursor=` :param page: set the page number of the response :type page: int @@ -245924,7 +245924,7 @@ async def index_rocky_errata_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rocky_errata_get_serialize( + _param = self._index_roche_get_serialize( page=page, limit=limit, cursor=cursor, @@ -245956,7 +245956,7 @@ async def index_rocky_errata_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination", '404': "str", '500': "str", } @@ -245967,7 +245967,7 @@ async def index_rocky_errata_get_without_preload_content( return response_data.response - def _index_rocky_errata_get_serialize( + def _index_roche_get_serialize( self, page, limit, @@ -246135,7 +246135,7 @@ def _index_rocky_errata_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/rocky-errata', + resource_path='/v3/index/roche', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -246152,7 +246152,7 @@ def _index_rocky_errata_get_serialize( @validate_call - async def index_rocky_get( + async def index_rockwell_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -246190,10 +246190,10 @@ async def index_rocky_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiUpdatePaginatePagination: - """Return vulnerability data stored in index \"rocky\" + ) -> RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination: + """Return vulnerability data stored in index \"rockwell\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Linux Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rockwell index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rockwell Automation Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rockwell?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rockwell?cursor=` :param page: set the page number of the response :type page: int @@ -246265,7 +246265,7 @@ async def index_rocky_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rocky_get_serialize( + _param = self._index_rockwell_get_serialize( page=page, limit=limit, cursor=cursor, @@ -246297,7 +246297,7 @@ async def index_rocky_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiUpdatePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination", '404': "str", '500': "str", } @@ -246313,7 +246313,7 @@ async def index_rocky_get( @validate_call - async def index_rocky_get_with_http_info( + async def index_rockwell_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -246351,10 +246351,10 @@ async def index_rocky_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiUpdatePaginatePagination]: - """Return vulnerability data stored in index \"rocky\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination]: + """Return vulnerability data stored in index \"rockwell\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Linux Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rockwell index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rockwell Automation Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rockwell?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rockwell?cursor=` :param page: set the page number of the response :type page: int @@ -246426,7 +246426,7 @@ async def index_rocky_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rocky_get_serialize( + _param = self._index_rockwell_get_serialize( page=page, limit=limit, cursor=cursor, @@ -246458,7 +246458,7 @@ async def index_rocky_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiUpdatePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination", '404': "str", '500': "str", } @@ -246474,7 +246474,7 @@ async def index_rocky_get_with_http_info( @validate_call - async def index_rocky_get_without_preload_content( + async def index_rockwell_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -246513,9 +246513,9 @@ async def index_rocky_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"rocky\" + """Return vulnerability data stored in index \"rockwell\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Linux Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rockwell index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rockwell Automation Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rockwell?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rockwell?cursor=` :param page: set the page number of the response :type page: int @@ -246587,7 +246587,7 @@ async def index_rocky_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rocky_get_serialize( + _param = self._index_rockwell_get_serialize( page=page, limit=limit, cursor=cursor, @@ -246619,7 +246619,7 @@ async def index_rocky_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiUpdatePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination", '404': "str", '500': "str", } @@ -246630,7 +246630,7 @@ async def index_rocky_get_without_preload_content( return response_data.response - def _index_rocky_get_serialize( + def _index_rockwell_get_serialize( self, page, limit, @@ -246798,7 +246798,7 @@ def _index_rocky_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/rocky', + resource_path='/v3/index/rockwell', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -246815,7 +246815,7 @@ def _index_rocky_get_serialize( @validate_call - async def index_rocky_purls_get( + async def index_rocky_errata_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -246853,10 +246853,10 @@ async def index_rocky_purls_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination: - """Return vulnerability data stored in index \"rocky-purls\" + ) -> RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination: + """Return vulnerability data stored in index \"rocky-errata\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky-purls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Purls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-purls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky-purls?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky-errata index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Errata ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-errata?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky-errata?cursor=` :param page: set the page number of the response :type page: int @@ -246928,7 +246928,7 @@ async def index_rocky_purls_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rocky_purls_get_serialize( + _param = self._index_rocky_errata_get_serialize( page=page, limit=limit, cursor=cursor, @@ -246960,7 +246960,7 @@ async def index_rocky_purls_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination", '404': "str", '500': "str", } @@ -246976,7 +246976,7 @@ async def index_rocky_purls_get( @validate_call - async def index_rocky_purls_get_with_http_info( + async def index_rocky_errata_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -247014,10 +247014,10 @@ async def index_rocky_purls_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination]: - """Return vulnerability data stored in index \"rocky-purls\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination]: + """Return vulnerability data stored in index \"rocky-errata\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky-purls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Purls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-purls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky-purls?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky-errata index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Errata ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-errata?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky-errata?cursor=` :param page: set the page number of the response :type page: int @@ -247089,7 +247089,7 @@ async def index_rocky_purls_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rocky_purls_get_serialize( + _param = self._index_rocky_errata_get_serialize( page=page, limit=limit, cursor=cursor, @@ -247121,7 +247121,7 @@ async def index_rocky_purls_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination", '404': "str", '500': "str", } @@ -247137,7 +247137,7 @@ async def index_rocky_purls_get_with_http_info( @validate_call - async def index_rocky_purls_get_without_preload_content( + async def index_rocky_errata_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -247176,9 +247176,9 @@ async def index_rocky_purls_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"rocky-purls\" + """Return vulnerability data stored in index \"rocky-errata\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky-purls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Purls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-purls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky-purls?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky-errata index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Errata ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-errata?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky-errata?cursor=` :param page: set the page number of the response :type page: int @@ -247250,7 +247250,7 @@ async def index_rocky_purls_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rocky_purls_get_serialize( + _param = self._index_rocky_errata_get_serialize( page=page, limit=limit, cursor=cursor, @@ -247282,7 +247282,7 @@ async def index_rocky_purls_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination", '404': "str", '500': "str", } @@ -247293,7 +247293,7 @@ async def index_rocky_purls_get_without_preload_content( return response_data.response - def _index_rocky_purls_get_serialize( + def _index_rocky_errata_get_serialize( self, page, limit, @@ -247461,7 +247461,7 @@ def _index_rocky_purls_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/rocky-purls', + resource_path='/v3/index/rocky-errata', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -247478,7 +247478,7 @@ def _index_rocky_purls_get_serialize( @validate_call - async def index_rsync_get( + async def index_rocky_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -247516,10 +247516,10 @@ async def index_rsync_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination: - """Return vulnerability data stored in index \"rsync\" + ) -> RenderResponseWithMetadataArrayApiUpdatePaginatePagination: + """Return vulnerability data stored in index \"rocky\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rsync index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rsync Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rsync?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rsync?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Linux Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky?cursor=` :param page: set the page number of the response :type page: int @@ -247591,7 +247591,7 @@ async def index_rsync_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rsync_get_serialize( + _param = self._index_rocky_get_serialize( page=page, limit=limit, cursor=cursor, @@ -247623,7 +247623,7 @@ async def index_rsync_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiUpdatePaginatePagination", '404': "str", '500': "str", } @@ -247639,7 +247639,7 @@ async def index_rsync_get( @validate_call - async def index_rsync_get_with_http_info( + async def index_rocky_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -247677,10 +247677,10 @@ async def index_rsync_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination]: - """Return vulnerability data stored in index \"rsync\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiUpdatePaginatePagination]: + """Return vulnerability data stored in index \"rocky\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rsync index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rsync Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rsync?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rsync?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Linux Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky?cursor=` :param page: set the page number of the response :type page: int @@ -247752,7 +247752,7 @@ async def index_rsync_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rsync_get_serialize( + _param = self._index_rocky_get_serialize( page=page, limit=limit, cursor=cursor, @@ -247784,7 +247784,7 @@ async def index_rsync_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiUpdatePaginatePagination", '404': "str", '500': "str", } @@ -247800,7 +247800,7 @@ async def index_rsync_get_with_http_info( @validate_call - async def index_rsync_get_without_preload_content( + async def index_rocky_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -247839,9 +247839,9 @@ async def index_rsync_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"rsync\" + """Return vulnerability data stored in index \"rocky\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rsync index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rsync Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rsync?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rsync?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Linux Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky?cursor=` :param page: set the page number of the response :type page: int @@ -247913,7 +247913,7 @@ async def index_rsync_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rsync_get_serialize( + _param = self._index_rocky_get_serialize( page=page, limit=limit, cursor=cursor, @@ -247945,7 +247945,7 @@ async def index_rsync_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiUpdatePaginatePagination", '404': "str", '500': "str", } @@ -247956,7 +247956,7 @@ async def index_rsync_get_without_preload_content( return response_data.response - def _index_rsync_get_serialize( + def _index_rocky_get_serialize( self, page, limit, @@ -248124,7 +248124,7 @@ def _index_rsync_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/rsync', + resource_path='/v3/index/rocky', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -248141,7 +248141,7 @@ def _index_rsync_get_serialize( @validate_call - async def index_ruckus_get( + async def index_rocky_purls_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -248179,10 +248179,10 @@ async def index_ruckus_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination: - """Return vulnerability data stored in index \"ruckus\" + ) -> RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination: + """Return vulnerability data stored in index \"rocky-purls\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ruckus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ruckus Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ruckus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ruckus?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky-purls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Purls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-purls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky-purls?cursor=` :param page: set the page number of the response :type page: int @@ -248254,7 +248254,7 @@ async def index_ruckus_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ruckus_get_serialize( + _param = self._index_rocky_purls_get_serialize( page=page, limit=limit, cursor=cursor, @@ -248286,7 +248286,7 @@ async def index_ruckus_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination", + '200': "RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination", '404': "str", '500': "str", } @@ -248302,7 +248302,7 @@ async def index_ruckus_get( @validate_call - async def index_ruckus_get_with_http_info( + async def index_rocky_purls_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -248340,10 +248340,10 @@ async def index_ruckus_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination]: - """Return vulnerability data stored in index \"ruckus\" + ) -> ApiResponse[RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination]: + """Return vulnerability data stored in index \"rocky-purls\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ruckus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ruckus Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ruckus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ruckus?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky-purls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Purls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-purls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky-purls?cursor=` :param page: set the page number of the response :type page: int @@ -248415,7 +248415,7 @@ async def index_ruckus_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ruckus_get_serialize( + _param = self._index_rocky_purls_get_serialize( page=page, limit=limit, cursor=cursor, @@ -248447,7 +248447,7 @@ async def index_ruckus_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination", + '200': "RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination", '404': "str", '500': "str", } @@ -248463,7 +248463,7 @@ async def index_ruckus_get_with_http_info( @validate_call - async def index_ruckus_get_without_preload_content( + async def index_rocky_purls_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -248502,9 +248502,9 @@ async def index_ruckus_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ruckus\" + """Return vulnerability data stored in index \"rocky-purls\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ruckus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ruckus Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ruckus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ruckus?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky-purls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Purls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-purls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky-purls?cursor=` :param page: set the page number of the response :type page: int @@ -248576,7 +248576,7 @@ async def index_ruckus_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ruckus_get_serialize( + _param = self._index_rocky_purls_get_serialize( page=page, limit=limit, cursor=cursor, @@ -248608,7 +248608,7 @@ async def index_ruckus_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination", + '200': "RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination", '404': "str", '500': "str", } @@ -248619,7 +248619,7 @@ async def index_ruckus_get_without_preload_content( return response_data.response - def _index_ruckus_get_serialize( + def _index_rocky_purls_get_serialize( self, page, limit, @@ -248787,7 +248787,7 @@ def _index_ruckus_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ruckus', + resource_path='/v3/index/rocky-purls', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -248804,7 +248804,7 @@ def _index_ruckus_get_serialize( @validate_call - async def index_rustsec_advisories_get( + async def index_rsync_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -248842,10 +248842,10 @@ async def index_rustsec_advisories_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"rustsec-advisories\" + ) -> RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination: + """Return vulnerability data stored in index \"rsync\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rustsec-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** RustSec Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rustsec-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rustsec-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rsync index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rsync Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rsync?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rsync?cursor=` :param page: set the page number of the response :type page: int @@ -248917,7 +248917,7 @@ async def index_rustsec_advisories_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rustsec_advisories_get_serialize( + _param = self._index_rsync_get_serialize( page=page, limit=limit, cursor=cursor, @@ -248949,7 +248949,7 @@ async def index_rustsec_advisories_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination", '404': "str", '500': "str", } @@ -248965,7 +248965,7 @@ async def index_rustsec_advisories_get( @validate_call - async def index_rustsec_advisories_get_with_http_info( + async def index_rsync_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -249003,10 +249003,10 @@ async def index_rustsec_advisories_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"rustsec-advisories\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination]: + """Return vulnerability data stored in index \"rsync\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rustsec-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** RustSec Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rustsec-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rustsec-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rsync index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rsync Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rsync?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rsync?cursor=` :param page: set the page number of the response :type page: int @@ -249078,7 +249078,7 @@ async def index_rustsec_advisories_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rustsec_advisories_get_serialize( + _param = self._index_rsync_get_serialize( page=page, limit=limit, cursor=cursor, @@ -249110,7 +249110,7 @@ async def index_rustsec_advisories_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination", '404': "str", '500': "str", } @@ -249126,7 +249126,7 @@ async def index_rustsec_advisories_get_with_http_info( @validate_call - async def index_rustsec_advisories_get_without_preload_content( + async def index_rsync_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -249165,9 +249165,9 @@ async def index_rustsec_advisories_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"rustsec-advisories\" + """Return vulnerability data stored in index \"rsync\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rustsec-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** RustSec Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rustsec-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rustsec-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rsync index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rsync Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rsync?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rsync?cursor=` :param page: set the page number of the response :type page: int @@ -249239,7 +249239,7 @@ async def index_rustsec_advisories_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rustsec_advisories_get_serialize( + _param = self._index_rsync_get_serialize( page=page, limit=limit, cursor=cursor, @@ -249271,7 +249271,7 @@ async def index_rustsec_advisories_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination", '404': "str", '500': "str", } @@ -249282,7 +249282,7 @@ async def index_rustsec_advisories_get_without_preload_content( return response_data.response - def _index_rustsec_advisories_get_serialize( + def _index_rsync_get_serialize( self, page, limit, @@ -249450,7 +249450,7 @@ def _index_rustsec_advisories_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/rustsec-advisories', + resource_path='/v3/index/rsync', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -249467,7 +249467,7 @@ def _index_rustsec_advisories_get_serialize( @validate_call - async def index_sacert_get( + async def index_ruckus_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -249505,10 +249505,10 @@ async def index_sacert_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"sacert\" + ) -> RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination: + """Return vulnerability data stored in index \"ruckus\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sacert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Saudi CERT ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sacert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sacert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ruckus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ruckus Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ruckus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ruckus?cursor=` :param page: set the page number of the response :type page: int @@ -249580,7 +249580,7 @@ async def index_sacert_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sacert_get_serialize( + _param = self._index_ruckus_get_serialize( page=page, limit=limit, cursor=cursor, @@ -249612,7 +249612,7 @@ async def index_sacert_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination", '404': "str", '500': "str", } @@ -249628,7 +249628,7 @@ async def index_sacert_get( @validate_call - async def index_sacert_get_with_http_info( + async def index_ruckus_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -249666,10 +249666,10 @@ async def index_sacert_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"sacert\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination]: + """Return vulnerability data stored in index \"ruckus\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sacert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Saudi CERT ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sacert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sacert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ruckus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ruckus Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ruckus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ruckus?cursor=` :param page: set the page number of the response :type page: int @@ -249741,7 +249741,7 @@ async def index_sacert_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sacert_get_serialize( + _param = self._index_ruckus_get_serialize( page=page, limit=limit, cursor=cursor, @@ -249773,7 +249773,7 @@ async def index_sacert_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination", '404': "str", '500': "str", } @@ -249789,7 +249789,7 @@ async def index_sacert_get_with_http_info( @validate_call - async def index_sacert_get_without_preload_content( + async def index_ruckus_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -249828,9 +249828,9 @@ async def index_sacert_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sacert\" + """Return vulnerability data stored in index \"ruckus\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sacert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Saudi CERT ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sacert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sacert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ruckus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ruckus Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ruckus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ruckus?cursor=` :param page: set the page number of the response :type page: int @@ -249902,7 +249902,7 @@ async def index_sacert_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sacert_get_serialize( + _param = self._index_ruckus_get_serialize( page=page, limit=limit, cursor=cursor, @@ -249934,7 +249934,7 @@ async def index_sacert_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination", '404': "str", '500': "str", } @@ -249945,7 +249945,7 @@ async def index_sacert_get_without_preload_content( return response_data.response - def _index_sacert_get_serialize( + def _index_ruckus_get_serialize( self, page, limit, @@ -250113,7 +250113,7 @@ def _index_sacert_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sacert', + resource_path='/v3/index/ruckus', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -250130,7 +250130,7 @@ def _index_sacert_get_serialize( @validate_call - async def index_safran_get( + async def index_rustsec_advisories_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -250168,10 +250168,10 @@ async def index_safran_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination: - """Return vulnerability data stored in index \"safran\" + ) -> RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"rustsec-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the safran index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Safran Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/safran?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/safran?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rustsec-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** RustSec Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rustsec-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rustsec-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -250243,7 +250243,7 @@ async def index_safran_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_safran_get_serialize( + _param = self._index_rustsec_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -250275,7 +250275,7 @@ async def index_safran_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -250291,7 +250291,7 @@ async def index_safran_get( @validate_call - async def index_safran_get_with_http_info( + async def index_rustsec_advisories_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -250329,10 +250329,10 @@ async def index_safran_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination]: - """Return vulnerability data stored in index \"safran\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"rustsec-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the safran index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Safran Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/safran?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/safran?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rustsec-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** RustSec Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rustsec-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rustsec-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -250404,7 +250404,7 @@ async def index_safran_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_safran_get_serialize( + _param = self._index_rustsec_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -250436,7 +250436,7 @@ async def index_safran_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -250452,7 +250452,7 @@ async def index_safran_get_with_http_info( @validate_call - async def index_safran_get_without_preload_content( + async def index_rustsec_advisories_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -250491,9 +250491,9 @@ async def index_safran_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"safran\" + """Return vulnerability data stored in index \"rustsec-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the safran index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Safran Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/safran?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/safran?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rustsec-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** RustSec Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rustsec-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rustsec-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -250565,7 +250565,7 @@ async def index_safran_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_safran_get_serialize( + _param = self._index_rustsec_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -250597,7 +250597,7 @@ async def index_safran_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -250608,7 +250608,7 @@ async def index_safran_get_without_preload_content( return response_data.response - def _index_safran_get_serialize( + def _index_rustsec_advisories_get_serialize( self, page, limit, @@ -250776,7 +250776,7 @@ def _index_safran_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/safran', + resource_path='/v3/index/rustsec-advisories', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -250793,7 +250793,7 @@ def _index_safran_get_serialize( @validate_call - async def index_saint_get( + async def index_sacert_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -250831,10 +250831,10 @@ async def index_saint_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination: - """Return vulnerability data stored in index \"saint\" + ) -> RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"sacert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the saint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SAINT Exploits ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/saint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/saint?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sacert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Saudi CERT ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sacert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sacert?cursor=` :param page: set the page number of the response :type page: int @@ -250906,7 +250906,7 @@ async def index_saint_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_saint_get_serialize( + _param = self._index_sacert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -250938,7 +250938,7 @@ async def index_saint_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -250954,7 +250954,7 @@ async def index_saint_get( @validate_call - async def index_saint_get_with_http_info( + async def index_sacert_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -250992,10 +250992,10 @@ async def index_saint_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination]: - """Return vulnerability data stored in index \"saint\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"sacert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the saint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SAINT Exploits ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/saint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/saint?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sacert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Saudi CERT ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sacert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sacert?cursor=` :param page: set the page number of the response :type page: int @@ -251067,7 +251067,7 @@ async def index_saint_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_saint_get_serialize( + _param = self._index_sacert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -251099,7 +251099,7 @@ async def index_saint_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -251115,7 +251115,7 @@ async def index_saint_get_with_http_info( @validate_call - async def index_saint_get_without_preload_content( + async def index_sacert_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -251154,9 +251154,9 @@ async def index_saint_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"saint\" + """Return vulnerability data stored in index \"sacert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the saint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SAINT Exploits ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/saint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/saint?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sacert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Saudi CERT ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sacert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sacert?cursor=` :param page: set the page number of the response :type page: int @@ -251228,7 +251228,7 @@ async def index_saint_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_saint_get_serialize( + _param = self._index_sacert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -251260,7 +251260,7 @@ async def index_saint_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -251271,7 +251271,7 @@ async def index_saint_get_without_preload_content( return response_data.response - def _index_saint_get_serialize( + def _index_sacert_get_serialize( self, page, limit, @@ -251439,7 +251439,7 @@ def _index_saint_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/saint', + resource_path='/v3/index/sacert', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -251456,7 +251456,7 @@ def _index_saint_get_serialize( @validate_call - async def index_salesforce_get( + async def index_safran_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -251494,10 +251494,10 @@ async def index_salesforce_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination: - """Return vulnerability data stored in index \"salesforce\" + ) -> RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination: + """Return vulnerability data stored in index \"safran\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the salesforce index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SalesForce Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/salesforce?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/salesforce?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the safran index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Safran Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/safran?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/safran?cursor=` :param page: set the page number of the response :type page: int @@ -251569,7 +251569,7 @@ async def index_salesforce_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_salesforce_get_serialize( + _param = self._index_safran_get_serialize( page=page, limit=limit, cursor=cursor, @@ -251601,7 +251601,7 @@ async def index_salesforce_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination", '404': "str", '500': "str", } @@ -251617,7 +251617,7 @@ async def index_salesforce_get( @validate_call - async def index_salesforce_get_with_http_info( + async def index_safran_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -251655,10 +251655,10 @@ async def index_salesforce_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination]: - """Return vulnerability data stored in index \"salesforce\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination]: + """Return vulnerability data stored in index \"safran\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the salesforce index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SalesForce Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/salesforce?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/salesforce?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the safran index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Safran Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/safran?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/safran?cursor=` :param page: set the page number of the response :type page: int @@ -251730,7 +251730,7 @@ async def index_salesforce_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_salesforce_get_serialize( + _param = self._index_safran_get_serialize( page=page, limit=limit, cursor=cursor, @@ -251762,7 +251762,7 @@ async def index_salesforce_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination", '404': "str", '500': "str", } @@ -251778,7 +251778,7 @@ async def index_salesforce_get_with_http_info( @validate_call - async def index_salesforce_get_without_preload_content( + async def index_safran_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -251817,9 +251817,9 @@ async def index_salesforce_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"salesforce\" + """Return vulnerability data stored in index \"safran\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the salesforce index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SalesForce Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/salesforce?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/salesforce?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the safran index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Safran Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/safran?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/safran?cursor=` :param page: set the page number of the response :type page: int @@ -251891,7 +251891,7 @@ async def index_salesforce_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_salesforce_get_serialize( + _param = self._index_safran_get_serialize( page=page, limit=limit, cursor=cursor, @@ -251923,7 +251923,7 @@ async def index_salesforce_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination", '404': "str", '500': "str", } @@ -251934,7 +251934,7 @@ async def index_salesforce_get_without_preload_content( return response_data.response - def _index_salesforce_get_serialize( + def _index_safran_get_serialize( self, page, limit, @@ -252102,7 +252102,7 @@ def _index_salesforce_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/salesforce', + resource_path='/v3/index/safran', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -252119,7 +252119,7 @@ def _index_salesforce_get_serialize( @validate_call - async def index_samba_get( + async def index_saint_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -252157,10 +252157,10 @@ async def index_samba_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination: - """Return vulnerability data stored in index \"samba\" + ) -> RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination: + """Return vulnerability data stored in index \"saint\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the samba index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Samba Security Releases ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/samba?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/samba?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the saint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SAINT Exploits ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/saint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/saint?cursor=` :param page: set the page number of the response :type page: int @@ -252232,7 +252232,7 @@ async def index_samba_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_samba_get_serialize( + _param = self._index_saint_get_serialize( page=page, limit=limit, cursor=cursor, @@ -252264,7 +252264,7 @@ async def index_samba_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination", '404': "str", '500': "str", } @@ -252280,7 +252280,7 @@ async def index_samba_get( @validate_call - async def index_samba_get_with_http_info( + async def index_saint_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -252318,10 +252318,10 @@ async def index_samba_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination]: - """Return vulnerability data stored in index \"samba\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination]: + """Return vulnerability data stored in index \"saint\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the samba index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Samba Security Releases ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/samba?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/samba?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the saint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SAINT Exploits ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/saint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/saint?cursor=` :param page: set the page number of the response :type page: int @@ -252393,7 +252393,7 @@ async def index_samba_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_samba_get_serialize( + _param = self._index_saint_get_serialize( page=page, limit=limit, cursor=cursor, @@ -252425,7 +252425,7 @@ async def index_samba_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination", '404': "str", '500': "str", } @@ -252441,7 +252441,7 @@ async def index_samba_get_with_http_info( @validate_call - async def index_samba_get_without_preload_content( + async def index_saint_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -252480,9 +252480,9 @@ async def index_samba_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"samba\" + """Return vulnerability data stored in index \"saint\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the samba index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Samba Security Releases ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/samba?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/samba?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the saint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SAINT Exploits ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/saint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/saint?cursor=` :param page: set the page number of the response :type page: int @@ -252554,7 +252554,7 @@ async def index_samba_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_samba_get_serialize( + _param = self._index_saint_get_serialize( page=page, limit=limit, cursor=cursor, @@ -252586,7 +252586,7 @@ async def index_samba_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination", '404': "str", '500': "str", } @@ -252597,7 +252597,7 @@ async def index_samba_get_without_preload_content( return response_data.response - def _index_samba_get_serialize( + def _index_saint_get_serialize( self, page, limit, @@ -252765,7 +252765,7 @@ def _index_samba_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/samba', + resource_path='/v3/index/saint', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -252782,7 +252782,7 @@ def _index_samba_get_serialize( @validate_call - async def index_sandisk_get( + async def index_salesforce_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -252820,10 +252820,10 @@ async def index_sandisk_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination: - """Return vulnerability data stored in index \"sandisk\" + ) -> RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination: + """Return vulnerability data stored in index \"salesforce\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sandisk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sandisk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sandisk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sandisk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the salesforce index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SalesForce Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/salesforce?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/salesforce?cursor=` :param page: set the page number of the response :type page: int @@ -252895,7 +252895,7 @@ async def index_sandisk_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sandisk_get_serialize( + _param = self._index_salesforce_get_serialize( page=page, limit=limit, cursor=cursor, @@ -252927,7 +252927,7 @@ async def index_sandisk_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination", '404': "str", '500': "str", } @@ -252943,7 +252943,7 @@ async def index_sandisk_get( @validate_call - async def index_sandisk_get_with_http_info( + async def index_salesforce_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -252981,10 +252981,10 @@ async def index_sandisk_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination]: - """Return vulnerability data stored in index \"sandisk\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination]: + """Return vulnerability data stored in index \"salesforce\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sandisk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sandisk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sandisk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sandisk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the salesforce index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SalesForce Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/salesforce?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/salesforce?cursor=` :param page: set the page number of the response :type page: int @@ -253056,7 +253056,7 @@ async def index_sandisk_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sandisk_get_serialize( + _param = self._index_salesforce_get_serialize( page=page, limit=limit, cursor=cursor, @@ -253088,7 +253088,7 @@ async def index_sandisk_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination", '404': "str", '500': "str", } @@ -253104,7 +253104,7 @@ async def index_sandisk_get_with_http_info( @validate_call - async def index_sandisk_get_without_preload_content( + async def index_salesforce_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -253143,9 +253143,9 @@ async def index_sandisk_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sandisk\" + """Return vulnerability data stored in index \"salesforce\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sandisk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sandisk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sandisk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sandisk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the salesforce index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SalesForce Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/salesforce?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/salesforce?cursor=` :param page: set the page number of the response :type page: int @@ -253217,7 +253217,7 @@ async def index_sandisk_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sandisk_get_serialize( + _param = self._index_salesforce_get_serialize( page=page, limit=limit, cursor=cursor, @@ -253249,7 +253249,7 @@ async def index_sandisk_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination", '404': "str", '500': "str", } @@ -253260,7 +253260,7 @@ async def index_sandisk_get_without_preload_content( return response_data.response - def _index_sandisk_get_serialize( + def _index_salesforce_get_serialize( self, page, limit, @@ -253428,7 +253428,7 @@ def _index_sandisk_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sandisk', + resource_path='/v3/index/salesforce', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -253445,7 +253445,7 @@ def _index_sandisk_get_serialize( @validate_call - async def index_sans_dshield_get( + async def index_samba_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -253483,10 +253483,10 @@ async def index_sans_dshield_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination: - """Return vulnerability data stored in index \"sans-dshield\" + ) -> RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination: + """Return vulnerability data stored in index \"samba\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sans-dshield index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SANS DShield Honeypot Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sans-dshield?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sans-dshield?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the samba index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Samba Security Releases ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/samba?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/samba?cursor=` :param page: set the page number of the response :type page: int @@ -253558,7 +253558,7 @@ async def index_sans_dshield_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sans_dshield_get_serialize( + _param = self._index_samba_get_serialize( page=page, limit=limit, cursor=cursor, @@ -253590,7 +253590,7 @@ async def index_sans_dshield_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination", '404': "str", '500': "str", } @@ -253606,7 +253606,7 @@ async def index_sans_dshield_get( @validate_call - async def index_sans_dshield_get_with_http_info( + async def index_samba_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -253644,10 +253644,10 @@ async def index_sans_dshield_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination]: - """Return vulnerability data stored in index \"sans-dshield\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination]: + """Return vulnerability data stored in index \"samba\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sans-dshield index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SANS DShield Honeypot Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sans-dshield?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sans-dshield?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the samba index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Samba Security Releases ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/samba?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/samba?cursor=` :param page: set the page number of the response :type page: int @@ -253719,7 +253719,7 @@ async def index_sans_dshield_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sans_dshield_get_serialize( + _param = self._index_samba_get_serialize( page=page, limit=limit, cursor=cursor, @@ -253751,7 +253751,7 @@ async def index_sans_dshield_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination", '404': "str", '500': "str", } @@ -253767,7 +253767,7 @@ async def index_sans_dshield_get_with_http_info( @validate_call - async def index_sans_dshield_get_without_preload_content( + async def index_samba_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -253806,9 +253806,9 @@ async def index_sans_dshield_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sans-dshield\" + """Return vulnerability data stored in index \"samba\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sans-dshield index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SANS DShield Honeypot Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sans-dshield?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sans-dshield?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the samba index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Samba Security Releases ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/samba?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/samba?cursor=` :param page: set the page number of the response :type page: int @@ -253880,7 +253880,7 @@ async def index_sans_dshield_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sans_dshield_get_serialize( + _param = self._index_samba_get_serialize( page=page, limit=limit, cursor=cursor, @@ -253912,7 +253912,7 @@ async def index_sans_dshield_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination", '404': "str", '500': "str", } @@ -253923,7 +253923,7 @@ async def index_sans_dshield_get_without_preload_content( return response_data.response - def _index_sans_dshield_get_serialize( + def _index_samba_get_serialize( self, page, limit, @@ -254091,7 +254091,7 @@ def _index_sans_dshield_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sans-dshield', + resource_path='/v3/index/samba', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -254108,7 +254108,7 @@ def _index_sans_dshield_get_serialize( @validate_call - async def index_sap_get( + async def index_sandisk_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -254146,10 +254146,10 @@ async def index_sap_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination: - """Return vulnerability data stored in index \"sap\" + ) -> RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination: + """Return vulnerability data stored in index \"sandisk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SAP Security Patch Days ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sap?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sandisk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sandisk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sandisk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sandisk?cursor=` :param page: set the page number of the response :type page: int @@ -254221,7 +254221,7 @@ async def index_sap_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sap_get_serialize( + _param = self._index_sandisk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -254253,7 +254253,7 @@ async def index_sap_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination", '404': "str", '500': "str", } @@ -254269,7 +254269,7 @@ async def index_sap_get( @validate_call - async def index_sap_get_with_http_info( + async def index_sandisk_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -254307,10 +254307,10 @@ async def index_sap_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination]: - """Return vulnerability data stored in index \"sap\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination]: + """Return vulnerability data stored in index \"sandisk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SAP Security Patch Days ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sap?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sandisk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sandisk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sandisk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sandisk?cursor=` :param page: set the page number of the response :type page: int @@ -254382,7 +254382,7 @@ async def index_sap_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sap_get_serialize( + _param = self._index_sandisk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -254414,7 +254414,7 @@ async def index_sap_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination", '404': "str", '500': "str", } @@ -254430,7 +254430,7 @@ async def index_sap_get_with_http_info( @validate_call - async def index_sap_get_without_preload_content( + async def index_sandisk_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -254469,9 +254469,9 @@ async def index_sap_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sap\" + """Return vulnerability data stored in index \"sandisk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SAP Security Patch Days ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sap?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sandisk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sandisk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sandisk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sandisk?cursor=` :param page: set the page number of the response :type page: int @@ -254543,7 +254543,7 @@ async def index_sap_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sap_get_serialize( + _param = self._index_sandisk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -254575,7 +254575,7 @@ async def index_sap_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination", '404': "str", '500': "str", } @@ -254586,7 +254586,7 @@ async def index_sap_get_without_preload_content( return response_data.response - def _index_sap_get_serialize( + def _index_sandisk_get_serialize( self, page, limit, @@ -254754,7 +254754,7 @@ def _index_sap_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sap', + resource_path='/v3/index/sandisk', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -254771,7 +254771,7 @@ def _index_sap_get_serialize( @validate_call - async def index_schneider_electric_get( + async def index_sans_dshield_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -254809,10 +254809,10 @@ async def index_schneider_electric_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"schneider-electric\" + ) -> RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination: + """Return vulnerability data stored in index \"sans-dshield\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the schneider-electric index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schneider Electric Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/schneider-electric?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/schneider-electric?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sans-dshield index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SANS DShield Honeypot Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sans-dshield?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sans-dshield?cursor=` :param page: set the page number of the response :type page: int @@ -254884,7 +254884,7 @@ async def index_schneider_electric_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_schneider_electric_get_serialize( + _param = self._index_sans_dshield_get_serialize( page=page, limit=limit, cursor=cursor, @@ -254916,7 +254916,7 @@ async def index_schneider_electric_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination", '404': "str", '500': "str", } @@ -254932,7 +254932,7 @@ async def index_schneider_electric_get( @validate_call - async def index_schneider_electric_get_with_http_info( + async def index_sans_dshield_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -254970,10 +254970,10 @@ async def index_schneider_electric_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"schneider-electric\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination]: + """Return vulnerability data stored in index \"sans-dshield\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the schneider-electric index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schneider Electric Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/schneider-electric?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/schneider-electric?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sans-dshield index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SANS DShield Honeypot Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sans-dshield?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sans-dshield?cursor=` :param page: set the page number of the response :type page: int @@ -255045,7 +255045,7 @@ async def index_schneider_electric_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_schneider_electric_get_serialize( + _param = self._index_sans_dshield_get_serialize( page=page, limit=limit, cursor=cursor, @@ -255077,7 +255077,7 @@ async def index_schneider_electric_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination", '404': "str", '500': "str", } @@ -255093,7 +255093,7 @@ async def index_schneider_electric_get_with_http_info( @validate_call - async def index_schneider_electric_get_without_preload_content( + async def index_sans_dshield_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -255132,9 +255132,9 @@ async def index_schneider_electric_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"schneider-electric\" + """Return vulnerability data stored in index \"sans-dshield\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the schneider-electric index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schneider Electric Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/schneider-electric?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/schneider-electric?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sans-dshield index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SANS DShield Honeypot Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sans-dshield?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sans-dshield?cursor=` :param page: set the page number of the response :type page: int @@ -255206,7 +255206,7 @@ async def index_schneider_electric_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_schneider_electric_get_serialize( + _param = self._index_sans_dshield_get_serialize( page=page, limit=limit, cursor=cursor, @@ -255238,7 +255238,7 @@ async def index_schneider_electric_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination", '404': "str", '500': "str", } @@ -255249,7 +255249,7 @@ async def index_schneider_electric_get_without_preload_content( return response_data.response - def _index_schneider_electric_get_serialize( + def _index_sans_dshield_get_serialize( self, page, limit, @@ -255417,7 +255417,7 @@ def _index_schneider_electric_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/schneider-electric', + resource_path='/v3/index/sans-dshield', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -255434,7 +255434,7 @@ def _index_schneider_electric_get_serialize( @validate_call - async def index_schutzwerk_get( + async def index_sap_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -255472,10 +255472,10 @@ async def index_schutzwerk_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination: - """Return vulnerability data stored in index \"schutzwerk\" + ) -> RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination: + """Return vulnerability data stored in index \"sap\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the schutzwerk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schutzwerk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/schutzwerk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/schutzwerk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SAP Security Patch Days ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sap?cursor=` :param page: set the page number of the response :type page: int @@ -255547,7 +255547,7 @@ async def index_schutzwerk_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_schutzwerk_get_serialize( + _param = self._index_sap_get_serialize( page=page, limit=limit, cursor=cursor, @@ -255579,7 +255579,7 @@ async def index_schutzwerk_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination", '404': "str", '500': "str", } @@ -255595,7 +255595,7 @@ async def index_schutzwerk_get( @validate_call - async def index_schutzwerk_get_with_http_info( + async def index_sap_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -255633,10 +255633,10 @@ async def index_schutzwerk_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination]: - """Return vulnerability data stored in index \"schutzwerk\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination]: + """Return vulnerability data stored in index \"sap\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the schutzwerk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schutzwerk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/schutzwerk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/schutzwerk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SAP Security Patch Days ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sap?cursor=` :param page: set the page number of the response :type page: int @@ -255708,7 +255708,7 @@ async def index_schutzwerk_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_schutzwerk_get_serialize( + _param = self._index_sap_get_serialize( page=page, limit=limit, cursor=cursor, @@ -255740,7 +255740,7 @@ async def index_schutzwerk_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination", '404': "str", '500': "str", } @@ -255756,7 +255756,7 @@ async def index_schutzwerk_get_with_http_info( @validate_call - async def index_schutzwerk_get_without_preload_content( + async def index_sap_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -255795,9 +255795,9 @@ async def index_schutzwerk_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"schutzwerk\" + """Return vulnerability data stored in index \"sap\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the schutzwerk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schutzwerk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/schutzwerk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/schutzwerk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SAP Security Patch Days ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sap?cursor=` :param page: set the page number of the response :type page: int @@ -255869,7 +255869,7 @@ async def index_schutzwerk_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_schutzwerk_get_serialize( + _param = self._index_sap_get_serialize( page=page, limit=limit, cursor=cursor, @@ -255901,7 +255901,7 @@ async def index_schutzwerk_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination", '404': "str", '500': "str", } @@ -255912,7 +255912,7 @@ async def index_schutzwerk_get_without_preload_content( return response_data.response - def _index_schutzwerk_get_serialize( + def _index_sap_get_serialize( self, page, limit, @@ -256080,7 +256080,7 @@ def _index_schutzwerk_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/schutzwerk', + resource_path='/v3/index/sap', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -256097,7 +256097,7 @@ def _index_schutzwerk_get_serialize( @validate_call - async def index_sec_consult_get( + async def index_schneider_electric_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -256135,10 +256135,10 @@ async def index_sec_consult_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination: - """Return vulnerability data stored in index \"sec-consult\" + ) -> RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"schneider-electric\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sec-consult index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SEC Consult Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sec-consult?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sec-consult?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the schneider-electric index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schneider Electric Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/schneider-electric?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/schneider-electric?cursor=` :param page: set the page number of the response :type page: int @@ -256210,7 +256210,7 @@ async def index_sec_consult_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sec_consult_get_serialize( + _param = self._index_schneider_electric_get_serialize( page=page, limit=limit, cursor=cursor, @@ -256242,7 +256242,7 @@ async def index_sec_consult_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -256258,7 +256258,7 @@ async def index_sec_consult_get( @validate_call - async def index_sec_consult_get_with_http_info( + async def index_schneider_electric_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -256296,10 +256296,10 @@ async def index_sec_consult_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination]: - """Return vulnerability data stored in index \"sec-consult\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"schneider-electric\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sec-consult index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SEC Consult Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sec-consult?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sec-consult?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the schneider-electric index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schneider Electric Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/schneider-electric?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/schneider-electric?cursor=` :param page: set the page number of the response :type page: int @@ -256371,7 +256371,7 @@ async def index_sec_consult_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sec_consult_get_serialize( + _param = self._index_schneider_electric_get_serialize( page=page, limit=limit, cursor=cursor, @@ -256403,7 +256403,7 @@ async def index_sec_consult_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -256419,7 +256419,7 @@ async def index_sec_consult_get_with_http_info( @validate_call - async def index_sec_consult_get_without_preload_content( + async def index_schneider_electric_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -256458,9 +256458,9 @@ async def index_sec_consult_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sec-consult\" + """Return vulnerability data stored in index \"schneider-electric\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sec-consult index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SEC Consult Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sec-consult?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sec-consult?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the schneider-electric index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schneider Electric Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/schneider-electric?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/schneider-electric?cursor=` :param page: set the page number of the response :type page: int @@ -256532,7 +256532,7 @@ async def index_sec_consult_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sec_consult_get_serialize( + _param = self._index_schneider_electric_get_serialize( page=page, limit=limit, cursor=cursor, @@ -256564,7 +256564,7 @@ async def index_sec_consult_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -256575,7 +256575,7 @@ async def index_sec_consult_get_without_preload_content( return response_data.response - def _index_sec_consult_get_serialize( + def _index_schneider_electric_get_serialize( self, page, limit, @@ -256743,7 +256743,7 @@ def _index_sec_consult_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sec-consult', + resource_path='/v3/index/schneider-electric', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -256760,7 +256760,7 @@ def _index_sec_consult_get_serialize( @validate_call - async def index_securitylab_get( + async def index_schutzwerk_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -256798,10 +256798,10 @@ async def index_securitylab_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination: - """Return vulnerability data stored in index \"securitylab\" + ) -> RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination: + """Return vulnerability data stored in index \"schutzwerk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the securitylab index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Security Lab Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/securitylab?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/securitylab?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the schutzwerk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schutzwerk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/schutzwerk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/schutzwerk?cursor=` :param page: set the page number of the response :type page: int @@ -256873,7 +256873,7 @@ async def index_securitylab_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_securitylab_get_serialize( + _param = self._index_schutzwerk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -256905,7 +256905,7 @@ async def index_securitylab_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination", '404': "str", '500': "str", } @@ -256921,7 +256921,7 @@ async def index_securitylab_get( @validate_call - async def index_securitylab_get_with_http_info( + async def index_schutzwerk_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -256959,10 +256959,10 @@ async def index_securitylab_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination]: - """Return vulnerability data stored in index \"securitylab\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination]: + """Return vulnerability data stored in index \"schutzwerk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the securitylab index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Security Lab Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/securitylab?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/securitylab?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the schutzwerk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schutzwerk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/schutzwerk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/schutzwerk?cursor=` :param page: set the page number of the response :type page: int @@ -257034,7 +257034,7 @@ async def index_securitylab_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_securitylab_get_serialize( + _param = self._index_schutzwerk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -257066,7 +257066,7 @@ async def index_securitylab_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination", '404': "str", '500': "str", } @@ -257082,7 +257082,7 @@ async def index_securitylab_get_with_http_info( @validate_call - async def index_securitylab_get_without_preload_content( + async def index_schutzwerk_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -257121,9 +257121,9 @@ async def index_securitylab_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"securitylab\" + """Return vulnerability data stored in index \"schutzwerk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the securitylab index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Security Lab Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/securitylab?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/securitylab?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the schutzwerk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schutzwerk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/schutzwerk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/schutzwerk?cursor=` :param page: set the page number of the response :type page: int @@ -257195,7 +257195,7 @@ async def index_securitylab_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_securitylab_get_serialize( + _param = self._index_schutzwerk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -257227,7 +257227,7 @@ async def index_securitylab_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination", '404': "str", '500': "str", } @@ -257238,7 +257238,7 @@ async def index_securitylab_get_without_preload_content( return response_data.response - def _index_securitylab_get_serialize( + def _index_schutzwerk_get_serialize( self, page, limit, @@ -257406,7 +257406,7 @@ def _index_securitylab_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/securitylab', + resource_path='/v3/index/schutzwerk', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -257423,7 +257423,7 @@ def _index_securitylab_get_serialize( @validate_call - async def index_seebug_get( + async def index_sec_consult_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -257461,10 +257461,10 @@ async def index_seebug_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination: - """Return vulnerability data stored in index \"seebug\" + ) -> RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination: + """Return vulnerability data stored in index \"sec-consult\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the seebug index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Seebug Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/seebug?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/seebug?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sec-consult index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SEC Consult Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sec-consult?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sec-consult?cursor=` :param page: set the page number of the response :type page: int @@ -257536,7 +257536,7 @@ async def index_seebug_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_seebug_get_serialize( + _param = self._index_sec_consult_get_serialize( page=page, limit=limit, cursor=cursor, @@ -257568,7 +257568,7 @@ async def index_seebug_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination", '404': "str", '500': "str", } @@ -257584,7 +257584,7 @@ async def index_seebug_get( @validate_call - async def index_seebug_get_with_http_info( + async def index_sec_consult_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -257622,10 +257622,10 @@ async def index_seebug_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination]: - """Return vulnerability data stored in index \"seebug\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination]: + """Return vulnerability data stored in index \"sec-consult\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the seebug index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Seebug Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/seebug?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/seebug?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sec-consult index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SEC Consult Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sec-consult?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sec-consult?cursor=` :param page: set the page number of the response :type page: int @@ -257697,7 +257697,7 @@ async def index_seebug_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_seebug_get_serialize( + _param = self._index_sec_consult_get_serialize( page=page, limit=limit, cursor=cursor, @@ -257729,7 +257729,7 @@ async def index_seebug_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination", '404': "str", '500': "str", } @@ -257745,7 +257745,7 @@ async def index_seebug_get_with_http_info( @validate_call - async def index_seebug_get_without_preload_content( + async def index_sec_consult_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -257784,9 +257784,9 @@ async def index_seebug_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"seebug\" + """Return vulnerability data stored in index \"sec-consult\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the seebug index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Seebug Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/seebug?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/seebug?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sec-consult index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SEC Consult Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sec-consult?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sec-consult?cursor=` :param page: set the page number of the response :type page: int @@ -257858,7 +257858,7 @@ async def index_seebug_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_seebug_get_serialize( + _param = self._index_sec_consult_get_serialize( page=page, limit=limit, cursor=cursor, @@ -257890,7 +257890,7 @@ async def index_seebug_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination", '404': "str", '500': "str", } @@ -257901,7 +257901,7 @@ async def index_seebug_get_without_preload_content( return response_data.response - def _index_seebug_get_serialize( + def _index_sec_consult_get_serialize( self, page, limit, @@ -258069,7 +258069,7 @@ def _index_seebug_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/seebug', + resource_path='/v3/index/sec-consult', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -258086,7 +258086,7 @@ def _index_seebug_get_serialize( @validate_call - async def index_sel_get( + async def index_securitylab_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -258124,10 +258124,10 @@ async def index_sel_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySelPaginatePagination: - """Return vulnerability data stored in index \"sel\" + ) -> RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination: + """Return vulnerability data stored in index \"securitylab\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schweitzer Engineering Laboratories Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sel?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the securitylab index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Security Lab Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/securitylab?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/securitylab?cursor=` :param page: set the page number of the response :type page: int @@ -258199,7 +258199,7 @@ async def index_sel_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sel_get_serialize( + _param = self._index_securitylab_get_serialize( page=page, limit=limit, cursor=cursor, @@ -258231,7 +258231,7 @@ async def index_sel_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySelPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination", '404': "str", '500': "str", } @@ -258247,7 +258247,7 @@ async def index_sel_get( @validate_call - async def index_sel_get_with_http_info( + async def index_securitylab_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -258285,10 +258285,10 @@ async def index_sel_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySelPaginatePagination]: - """Return vulnerability data stored in index \"sel\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination]: + """Return vulnerability data stored in index \"securitylab\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schweitzer Engineering Laboratories Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sel?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the securitylab index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Security Lab Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/securitylab?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/securitylab?cursor=` :param page: set the page number of the response :type page: int @@ -258360,7 +258360,7 @@ async def index_sel_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sel_get_serialize( + _param = self._index_securitylab_get_serialize( page=page, limit=limit, cursor=cursor, @@ -258392,7 +258392,7 @@ async def index_sel_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySelPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination", '404': "str", '500': "str", } @@ -258408,7 +258408,7 @@ async def index_sel_get_with_http_info( @validate_call - async def index_sel_get_without_preload_content( + async def index_securitylab_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -258447,9 +258447,9 @@ async def index_sel_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sel\" + """Return vulnerability data stored in index \"securitylab\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schweitzer Engineering Laboratories Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sel?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the securitylab index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Security Lab Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/securitylab?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/securitylab?cursor=` :param page: set the page number of the response :type page: int @@ -258521,7 +258521,7 @@ async def index_sel_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sel_get_serialize( + _param = self._index_securitylab_get_serialize( page=page, limit=limit, cursor=cursor, @@ -258553,7 +258553,7 @@ async def index_sel_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySelPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination", '404': "str", '500': "str", } @@ -258564,7 +258564,7 @@ async def index_sel_get_without_preload_content( return response_data.response - def _index_sel_get_serialize( + def _index_securitylab_get_serialize( self, page, limit, @@ -258732,7 +258732,7 @@ def _index_sel_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sel', + resource_path='/v3/index/securitylab', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -258749,7 +258749,7 @@ def _index_sel_get_serialize( @validate_call - async def index_sentinelone_get( + async def index_seebug_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -258787,10 +258787,10 @@ async def index_sentinelone_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination: - """Return vulnerability data stored in index \"sentinelone\" + ) -> RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination: + """Return vulnerability data stored in index \"seebug\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sentinelone index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SentinelOne Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sentinelone?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sentinelone?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the seebug index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Seebug Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/seebug?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/seebug?cursor=` :param page: set the page number of the response :type page: int @@ -258862,7 +258862,7 @@ async def index_sentinelone_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sentinelone_get_serialize( + _param = self._index_seebug_get_serialize( page=page, limit=limit, cursor=cursor, @@ -258894,7 +258894,7 @@ async def index_sentinelone_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination", '404': "str", '500': "str", } @@ -258910,7 +258910,7 @@ async def index_sentinelone_get( @validate_call - async def index_sentinelone_get_with_http_info( + async def index_seebug_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -258948,10 +258948,10 @@ async def index_sentinelone_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination]: - """Return vulnerability data stored in index \"sentinelone\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination]: + """Return vulnerability data stored in index \"seebug\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sentinelone index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SentinelOne Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sentinelone?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sentinelone?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the seebug index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Seebug Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/seebug?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/seebug?cursor=` :param page: set the page number of the response :type page: int @@ -259023,7 +259023,7 @@ async def index_sentinelone_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sentinelone_get_serialize( + _param = self._index_seebug_get_serialize( page=page, limit=limit, cursor=cursor, @@ -259055,7 +259055,7 @@ async def index_sentinelone_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination", '404': "str", '500': "str", } @@ -259071,7 +259071,7 @@ async def index_sentinelone_get_with_http_info( @validate_call - async def index_sentinelone_get_without_preload_content( + async def index_seebug_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -259110,9 +259110,9 @@ async def index_sentinelone_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sentinelone\" + """Return vulnerability data stored in index \"seebug\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sentinelone index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SentinelOne Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sentinelone?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sentinelone?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the seebug index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Seebug Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/seebug?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/seebug?cursor=` :param page: set the page number of the response :type page: int @@ -259184,7 +259184,7 @@ async def index_sentinelone_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sentinelone_get_serialize( + _param = self._index_seebug_get_serialize( page=page, limit=limit, cursor=cursor, @@ -259216,7 +259216,7 @@ async def index_sentinelone_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination", '404': "str", '500': "str", } @@ -259227,7 +259227,7 @@ async def index_sentinelone_get_without_preload_content( return response_data.response - def _index_sentinelone_get_serialize( + def _index_seebug_get_serialize( self, page, limit, @@ -259395,7 +259395,7 @@ def _index_sentinelone_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sentinelone', + resource_path='/v3/index/seebug', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -259412,7 +259412,7 @@ def _index_sentinelone_get_serialize( @validate_call - async def index_servicenow_get( + async def index_sel_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -259450,10 +259450,10 @@ async def index_servicenow_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination: - """Return vulnerability data stored in index \"servicenow\" + ) -> RenderResponseWithMetadataArrayAdvisorySelPaginatePagination: + """Return vulnerability data stored in index \"sel\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the servicenow index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** ServiceNow CVE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/servicenow?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/servicenow?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schweitzer Engineering Laboratories Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sel?cursor=` :param page: set the page number of the response :type page: int @@ -259525,7 +259525,7 @@ async def index_servicenow_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_servicenow_get_serialize( + _param = self._index_sel_get_serialize( page=page, limit=limit, cursor=cursor, @@ -259557,7 +259557,7 @@ async def index_servicenow_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySelPaginatePagination", '404': "str", '500': "str", } @@ -259573,7 +259573,7 @@ async def index_servicenow_get( @validate_call - async def index_servicenow_get_with_http_info( + async def index_sel_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -259611,10 +259611,10 @@ async def index_servicenow_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination]: - """Return vulnerability data stored in index \"servicenow\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySelPaginatePagination]: + """Return vulnerability data stored in index \"sel\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the servicenow index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** ServiceNow CVE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/servicenow?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/servicenow?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schweitzer Engineering Laboratories Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sel?cursor=` :param page: set the page number of the response :type page: int @@ -259686,7 +259686,7 @@ async def index_servicenow_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_servicenow_get_serialize( + _param = self._index_sel_get_serialize( page=page, limit=limit, cursor=cursor, @@ -259718,7 +259718,7 @@ async def index_servicenow_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySelPaginatePagination", '404': "str", '500': "str", } @@ -259734,7 +259734,7 @@ async def index_servicenow_get_with_http_info( @validate_call - async def index_servicenow_get_without_preload_content( + async def index_sel_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -259773,9 +259773,9 @@ async def index_servicenow_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"servicenow\" + """Return vulnerability data stored in index \"sel\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the servicenow index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** ServiceNow CVE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/servicenow?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/servicenow?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schweitzer Engineering Laboratories Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sel?cursor=` :param page: set the page number of the response :type page: int @@ -259847,7 +259847,7 @@ async def index_servicenow_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_servicenow_get_serialize( + _param = self._index_sel_get_serialize( page=page, limit=limit, cursor=cursor, @@ -259879,7 +259879,7 @@ async def index_servicenow_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySelPaginatePagination", '404': "str", '500': "str", } @@ -259890,7 +259890,7 @@ async def index_servicenow_get_without_preload_content( return response_data.response - def _index_servicenow_get_serialize( + def _index_sel_get_serialize( self, page, limit, @@ -260058,7 +260058,7 @@ def _index_servicenow_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/servicenow', + resource_path='/v3/index/sel', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -260075,7 +260075,7 @@ def _index_servicenow_get_serialize( @validate_call - async def index_shadowserver_exploited_get( + async def index_sentinelone_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -260113,10 +260113,10 @@ async def index_shadowserver_exploited_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination: - """Return vulnerability data stored in index \"shadowserver-exploited\" + ) -> RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination: + """Return vulnerability data stored in index \"sentinelone\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the shadowserver-exploited index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Shadowserver Foundation Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/shadowserver-exploited?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/shadowserver-exploited?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sentinelone index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SentinelOne Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sentinelone?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sentinelone?cursor=` :param page: set the page number of the response :type page: int @@ -260188,7 +260188,7 @@ async def index_shadowserver_exploited_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_shadowserver_exploited_get_serialize( + _param = self._index_sentinelone_get_serialize( page=page, limit=limit, cursor=cursor, @@ -260220,7 +260220,7 @@ async def index_shadowserver_exploited_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination", '404': "str", '500': "str", } @@ -260236,7 +260236,7 @@ async def index_shadowserver_exploited_get( @validate_call - async def index_shadowserver_exploited_get_with_http_info( + async def index_sentinelone_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -260274,10 +260274,10 @@ async def index_shadowserver_exploited_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination]: - """Return vulnerability data stored in index \"shadowserver-exploited\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination]: + """Return vulnerability data stored in index \"sentinelone\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the shadowserver-exploited index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Shadowserver Foundation Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/shadowserver-exploited?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/shadowserver-exploited?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sentinelone index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SentinelOne Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sentinelone?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sentinelone?cursor=` :param page: set the page number of the response :type page: int @@ -260349,7 +260349,7 @@ async def index_shadowserver_exploited_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_shadowserver_exploited_get_serialize( + _param = self._index_sentinelone_get_serialize( page=page, limit=limit, cursor=cursor, @@ -260381,7 +260381,7 @@ async def index_shadowserver_exploited_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination", '404': "str", '500': "str", } @@ -260397,7 +260397,7 @@ async def index_shadowserver_exploited_get_with_http_info( @validate_call - async def index_shadowserver_exploited_get_without_preload_content( + async def index_sentinelone_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -260436,9 +260436,9 @@ async def index_shadowserver_exploited_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"shadowserver-exploited\" + """Return vulnerability data stored in index \"sentinelone\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the shadowserver-exploited index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Shadowserver Foundation Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/shadowserver-exploited?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/shadowserver-exploited?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sentinelone index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SentinelOne Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sentinelone?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sentinelone?cursor=` :param page: set the page number of the response :type page: int @@ -260510,7 +260510,7 @@ async def index_shadowserver_exploited_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_shadowserver_exploited_get_serialize( + _param = self._index_sentinelone_get_serialize( page=page, limit=limit, cursor=cursor, @@ -260542,7 +260542,7 @@ async def index_shadowserver_exploited_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination", '404': "str", '500': "str", } @@ -260553,7 +260553,7 @@ async def index_shadowserver_exploited_get_without_preload_content( return response_data.response - def _index_shadowserver_exploited_get_serialize( + def _index_sentinelone_get_serialize( self, page, limit, @@ -260721,7 +260721,7 @@ def _index_shadowserver_exploited_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/shadowserver-exploited', + resource_path='/v3/index/sentinelone', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -260738,7 +260738,7 @@ def _index_shadowserver_exploited_get_serialize( @validate_call - async def index_shielder_get( + async def index_servicenow_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -260776,10 +260776,10 @@ async def index_shielder_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination: - """Return vulnerability data stored in index \"shielder\" + ) -> RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination: + """Return vulnerability data stored in index \"servicenow\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the shielder index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Shielder Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/shielder?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/shielder?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the servicenow index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** ServiceNow CVE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/servicenow?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/servicenow?cursor=` :param page: set the page number of the response :type page: int @@ -260851,7 +260851,7 @@ async def index_shielder_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_shielder_get_serialize( + _param = self._index_servicenow_get_serialize( page=page, limit=limit, cursor=cursor, @@ -260883,7 +260883,7 @@ async def index_shielder_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination", '404': "str", '500': "str", } @@ -260899,7 +260899,7 @@ async def index_shielder_get( @validate_call - async def index_shielder_get_with_http_info( + async def index_servicenow_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -260937,10 +260937,10 @@ async def index_shielder_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination]: - """Return vulnerability data stored in index \"shielder\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination]: + """Return vulnerability data stored in index \"servicenow\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the shielder index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Shielder Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/shielder?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/shielder?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the servicenow index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** ServiceNow CVE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/servicenow?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/servicenow?cursor=` :param page: set the page number of the response :type page: int @@ -261012,7 +261012,7 @@ async def index_shielder_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_shielder_get_serialize( + _param = self._index_servicenow_get_serialize( page=page, limit=limit, cursor=cursor, @@ -261044,7 +261044,7 @@ async def index_shielder_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination", '404': "str", '500': "str", } @@ -261060,7 +261060,7 @@ async def index_shielder_get_with_http_info( @validate_call - async def index_shielder_get_without_preload_content( + async def index_servicenow_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -261099,9 +261099,9 @@ async def index_shielder_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"shielder\" + """Return vulnerability data stored in index \"servicenow\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the shielder index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Shielder Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/shielder?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/shielder?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the servicenow index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** ServiceNow CVE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/servicenow?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/servicenow?cursor=` :param page: set the page number of the response :type page: int @@ -261173,7 +261173,7 @@ async def index_shielder_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_shielder_get_serialize( + _param = self._index_servicenow_get_serialize( page=page, limit=limit, cursor=cursor, @@ -261205,7 +261205,7 @@ async def index_shielder_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination", '404': "str", '500': "str", } @@ -261216,7 +261216,7 @@ async def index_shielder_get_without_preload_content( return response_data.response - def _index_shielder_get_serialize( + def _index_servicenow_get_serialize( self, page, limit, @@ -261384,7 +261384,7 @@ def _index_shielder_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/shielder', + resource_path='/v3/index/servicenow', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -261401,7 +261401,7 @@ def _index_shielder_get_serialize( @validate_call - async def index_sick_get( + async def index_shadowserver_exploited_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -261439,10 +261439,10 @@ async def index_sick_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySickPaginatePagination: - """Return vulnerability data stored in index \"sick\" + ) -> RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination: + """Return vulnerability data stored in index \"shadowserver-exploited\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sick index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SICK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sick?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sick?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the shadowserver-exploited index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Shadowserver Foundation Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/shadowserver-exploited?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/shadowserver-exploited?cursor=` :param page: set the page number of the response :type page: int @@ -261514,7 +261514,7 @@ async def index_sick_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sick_get_serialize( + _param = self._index_shadowserver_exploited_get_serialize( page=page, limit=limit, cursor=cursor, @@ -261546,7 +261546,7 @@ async def index_sick_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySickPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination", '404': "str", '500': "str", } @@ -261562,7 +261562,7 @@ async def index_sick_get( @validate_call - async def index_sick_get_with_http_info( + async def index_shadowserver_exploited_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -261600,10 +261600,10 @@ async def index_sick_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySickPaginatePagination]: - """Return vulnerability data stored in index \"sick\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination]: + """Return vulnerability data stored in index \"shadowserver-exploited\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sick index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SICK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sick?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sick?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the shadowserver-exploited index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Shadowserver Foundation Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/shadowserver-exploited?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/shadowserver-exploited?cursor=` :param page: set the page number of the response :type page: int @@ -261675,7 +261675,7 @@ async def index_sick_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sick_get_serialize( + _param = self._index_shadowserver_exploited_get_serialize( page=page, limit=limit, cursor=cursor, @@ -261707,7 +261707,7 @@ async def index_sick_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySickPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination", '404': "str", '500': "str", } @@ -261723,7 +261723,7 @@ async def index_sick_get_with_http_info( @validate_call - async def index_sick_get_without_preload_content( + async def index_shadowserver_exploited_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -261762,9 +261762,9 @@ async def index_sick_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sick\" + """Return vulnerability data stored in index \"shadowserver-exploited\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sick index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SICK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sick?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sick?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the shadowserver-exploited index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Shadowserver Foundation Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/shadowserver-exploited?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/shadowserver-exploited?cursor=` :param page: set the page number of the response :type page: int @@ -261836,7 +261836,7 @@ async def index_sick_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sick_get_serialize( + _param = self._index_shadowserver_exploited_get_serialize( page=page, limit=limit, cursor=cursor, @@ -261868,7 +261868,7 @@ async def index_sick_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySickPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination", '404': "str", '500': "str", } @@ -261879,7 +261879,7 @@ async def index_sick_get_without_preload_content( return response_data.response - def _index_sick_get_serialize( + def _index_shadowserver_exploited_get_serialize( self, page, limit, @@ -262047,7 +262047,7 @@ def _index_sick_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sick', + resource_path='/v3/index/shadowserver-exploited', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -262064,7 +262064,7 @@ def _index_sick_get_serialize( @validate_call - async def index_siemens_get( + async def index_shielder_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -262102,10 +262102,10 @@ async def index_siemens_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"siemens\" + ) -> RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination: + """Return vulnerability data stored in index \"shielder\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the siemens index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Siemens Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/siemens?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/siemens?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the shielder index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Shielder Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/shielder?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/shielder?cursor=` :param page: set the page number of the response :type page: int @@ -262177,7 +262177,7 @@ async def index_siemens_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_siemens_get_serialize( + _param = self._index_shielder_get_serialize( page=page, limit=limit, cursor=cursor, @@ -262209,7 +262209,7 @@ async def index_siemens_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination", '404': "str", '500': "str", } @@ -262225,7 +262225,7 @@ async def index_siemens_get( @validate_call - async def index_siemens_get_with_http_info( + async def index_shielder_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -262263,10 +262263,10 @@ async def index_siemens_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"siemens\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination]: + """Return vulnerability data stored in index \"shielder\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the siemens index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Siemens Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/siemens?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/siemens?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the shielder index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Shielder Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/shielder?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/shielder?cursor=` :param page: set the page number of the response :type page: int @@ -262338,7 +262338,7 @@ async def index_siemens_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_siemens_get_serialize( + _param = self._index_shielder_get_serialize( page=page, limit=limit, cursor=cursor, @@ -262370,7 +262370,7 @@ async def index_siemens_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination", '404': "str", '500': "str", } @@ -262386,7 +262386,7 @@ async def index_siemens_get_with_http_info( @validate_call - async def index_siemens_get_without_preload_content( + async def index_shielder_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -262425,9 +262425,9 @@ async def index_siemens_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"siemens\" + """Return vulnerability data stored in index \"shielder\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the siemens index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Siemens Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/siemens?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/siemens?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the shielder index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Shielder Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/shielder?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/shielder?cursor=` :param page: set the page number of the response :type page: int @@ -262499,7 +262499,7 @@ async def index_siemens_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_siemens_get_serialize( + _param = self._index_shielder_get_serialize( page=page, limit=limit, cursor=cursor, @@ -262531,7 +262531,7 @@ async def index_siemens_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination", '404': "str", '500': "str", } @@ -262542,7 +262542,7 @@ async def index_siemens_get_without_preload_content( return response_data.response - def _index_siemens_get_serialize( + def _index_shielder_get_serialize( self, page, limit, @@ -262710,7 +262710,7 @@ def _index_siemens_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/siemens', + resource_path='/v3/index/shielder', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -262727,7 +262727,7 @@ def _index_siemens_get_serialize( @validate_call - async def index_sierra_wireless_get( + async def index_sick_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -262765,10 +262765,10 @@ async def index_sierra_wireless_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination: - """Return vulnerability data stored in index \"sierra-wireless\" + ) -> RenderResponseWithMetadataArrayAdvisorySickPaginatePagination: + """Return vulnerability data stored in index \"sick\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sierra-wireless index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sierra Wireless Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sierra-wireless?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sierra-wireless?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sick index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SICK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sick?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sick?cursor=` :param page: set the page number of the response :type page: int @@ -262840,7 +262840,7 @@ async def index_sierra_wireless_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sierra_wireless_get_serialize( + _param = self._index_sick_get_serialize( page=page, limit=limit, cursor=cursor, @@ -262872,7 +262872,7 @@ async def index_sierra_wireless_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySickPaginatePagination", '404': "str", '500': "str", } @@ -262888,7 +262888,7 @@ async def index_sierra_wireless_get( @validate_call - async def index_sierra_wireless_get_with_http_info( + async def index_sick_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -262926,10 +262926,10 @@ async def index_sierra_wireless_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination]: - """Return vulnerability data stored in index \"sierra-wireless\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySickPaginatePagination]: + """Return vulnerability data stored in index \"sick\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sierra-wireless index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sierra Wireless Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sierra-wireless?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sierra-wireless?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sick index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SICK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sick?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sick?cursor=` :param page: set the page number of the response :type page: int @@ -263001,7 +263001,7 @@ async def index_sierra_wireless_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sierra_wireless_get_serialize( + _param = self._index_sick_get_serialize( page=page, limit=limit, cursor=cursor, @@ -263033,7 +263033,7 @@ async def index_sierra_wireless_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySickPaginatePagination", '404': "str", '500': "str", } @@ -263049,7 +263049,7 @@ async def index_sierra_wireless_get_with_http_info( @validate_call - async def index_sierra_wireless_get_without_preload_content( + async def index_sick_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -263088,9 +263088,9 @@ async def index_sierra_wireless_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sierra-wireless\" + """Return vulnerability data stored in index \"sick\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sierra-wireless index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sierra Wireless Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sierra-wireless?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sierra-wireless?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sick index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SICK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sick?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sick?cursor=` :param page: set the page number of the response :type page: int @@ -263162,7 +263162,7 @@ async def index_sierra_wireless_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sierra_wireless_get_serialize( + _param = self._index_sick_get_serialize( page=page, limit=limit, cursor=cursor, @@ -263194,7 +263194,7 @@ async def index_sierra_wireless_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySickPaginatePagination", '404': "str", '500': "str", } @@ -263205,7 +263205,7 @@ async def index_sierra_wireless_get_without_preload_content( return response_data.response - def _index_sierra_wireless_get_serialize( + def _index_sick_get_serialize( self, page, limit, @@ -263373,7 +263373,7 @@ def _index_sierra_wireless_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sierra-wireless', + resource_path='/v3/index/sick', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -263390,7 +263390,7 @@ def _index_sierra_wireless_get_serialize( @validate_call - async def index_sigmahq_sigma_rules_get( + async def index_siemens_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -263428,10 +263428,10 @@ async def index_sigmahq_sigma_rules_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination: - """Return vulnerability data stored in index \"sigmahq-sigma-rules\" + ) -> RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"siemens\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sigmahq-sigma-rules index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sigma Rules ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sigmahq-sigma-rules?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sigmahq-sigma-rules?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the siemens index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Siemens Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/siemens?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/siemens?cursor=` :param page: set the page number of the response :type page: int @@ -263503,7 +263503,7 @@ async def index_sigmahq_sigma_rules_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sigmahq_sigma_rules_get_serialize( + _param = self._index_siemens_get_serialize( page=page, limit=limit, cursor=cursor, @@ -263535,7 +263535,7 @@ async def index_sigmahq_sigma_rules_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -263551,7 +263551,7 @@ async def index_sigmahq_sigma_rules_get( @validate_call - async def index_sigmahq_sigma_rules_get_with_http_info( + async def index_siemens_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -263589,10 +263589,10 @@ async def index_sigmahq_sigma_rules_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination]: - """Return vulnerability data stored in index \"sigmahq-sigma-rules\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"siemens\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sigmahq-sigma-rules index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sigma Rules ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sigmahq-sigma-rules?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sigmahq-sigma-rules?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the siemens index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Siemens Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/siemens?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/siemens?cursor=` :param page: set the page number of the response :type page: int @@ -263664,7 +263664,7 @@ async def index_sigmahq_sigma_rules_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sigmahq_sigma_rules_get_serialize( + _param = self._index_siemens_get_serialize( page=page, limit=limit, cursor=cursor, @@ -263696,7 +263696,7 @@ async def index_sigmahq_sigma_rules_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -263712,7 +263712,7 @@ async def index_sigmahq_sigma_rules_get_with_http_info( @validate_call - async def index_sigmahq_sigma_rules_get_without_preload_content( + async def index_siemens_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -263751,9 +263751,9 @@ async def index_sigmahq_sigma_rules_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sigmahq-sigma-rules\" + """Return vulnerability data stored in index \"siemens\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sigmahq-sigma-rules index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sigma Rules ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sigmahq-sigma-rules?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sigmahq-sigma-rules?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the siemens index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Siemens Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/siemens?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/siemens?cursor=` :param page: set the page number of the response :type page: int @@ -263825,7 +263825,7 @@ async def index_sigmahq_sigma_rules_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sigmahq_sigma_rules_get_serialize( + _param = self._index_siemens_get_serialize( page=page, limit=limit, cursor=cursor, @@ -263857,7 +263857,7 @@ async def index_sigmahq_sigma_rules_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -263868,7 +263868,7 @@ async def index_sigmahq_sigma_rules_get_without_preload_content( return response_data.response - def _index_sigmahq_sigma_rules_get_serialize( + def _index_siemens_get_serialize( self, page, limit, @@ -264036,7 +264036,7 @@ def _index_sigmahq_sigma_rules_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sigmahq-sigma-rules', + resource_path='/v3/index/siemens', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -264053,7 +264053,7 @@ def _index_sigmahq_sigma_rules_get_serialize( @validate_call - async def index_singcert_get( + async def index_sierra_wireless_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -264091,10 +264091,10 @@ async def index_singcert_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination: - """Return vulnerability data stored in index \"singcert\" + ) -> RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination: + """Return vulnerability data stored in index \"sierra-wireless\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the singcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CSA Alerts and Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/singcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/singcert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sierra-wireless index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sierra Wireless Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sierra-wireless?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sierra-wireless?cursor=` :param page: set the page number of the response :type page: int @@ -264166,7 +264166,7 @@ async def index_singcert_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_singcert_get_serialize( + _param = self._index_sierra_wireless_get_serialize( page=page, limit=limit, cursor=cursor, @@ -264198,7 +264198,7 @@ async def index_singcert_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination", '404': "str", '500': "str", } @@ -264214,7 +264214,7 @@ async def index_singcert_get( @validate_call - async def index_singcert_get_with_http_info( + async def index_sierra_wireless_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -264252,10 +264252,10 @@ async def index_singcert_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination]: - """Return vulnerability data stored in index \"singcert\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination]: + """Return vulnerability data stored in index \"sierra-wireless\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the singcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CSA Alerts and Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/singcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/singcert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sierra-wireless index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sierra Wireless Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sierra-wireless?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sierra-wireless?cursor=` :param page: set the page number of the response :type page: int @@ -264327,7 +264327,7 @@ async def index_singcert_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_singcert_get_serialize( + _param = self._index_sierra_wireless_get_serialize( page=page, limit=limit, cursor=cursor, @@ -264359,7 +264359,7 @@ async def index_singcert_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination", '404': "str", '500': "str", } @@ -264375,7 +264375,7 @@ async def index_singcert_get_with_http_info( @validate_call - async def index_singcert_get_without_preload_content( + async def index_sierra_wireless_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -264414,9 +264414,9 @@ async def index_singcert_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"singcert\" + """Return vulnerability data stored in index \"sierra-wireless\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the singcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CSA Alerts and Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/singcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/singcert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sierra-wireless index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sierra Wireless Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sierra-wireless?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sierra-wireless?cursor=` :param page: set the page number of the response :type page: int @@ -264488,7 +264488,7 @@ async def index_singcert_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_singcert_get_serialize( + _param = self._index_sierra_wireless_get_serialize( page=page, limit=limit, cursor=cursor, @@ -264520,7 +264520,7 @@ async def index_singcert_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination", '404': "str", '500': "str", } @@ -264531,7 +264531,7 @@ async def index_singcert_get_without_preload_content( return response_data.response - def _index_singcert_get_serialize( + def _index_sierra_wireless_get_serialize( self, page, limit, @@ -264699,7 +264699,7 @@ def _index_singcert_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/singcert', + resource_path='/v3/index/sierra-wireless', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -264716,7 +264716,7 @@ def _index_singcert_get_serialize( @validate_call - async def index_sitecore_get( + async def index_sigmahq_sigma_rules_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -264754,10 +264754,10 @@ async def index_sitecore_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination: - """Return vulnerability data stored in index \"sitecore\" + ) -> RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination: + """Return vulnerability data stored in index \"sigmahq-sigma-rules\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sitecore index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sitecore Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sitecore?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sitecore?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sigmahq-sigma-rules index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sigma Rules ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sigmahq-sigma-rules?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sigmahq-sigma-rules?cursor=` :param page: set the page number of the response :type page: int @@ -264829,7 +264829,7 @@ async def index_sitecore_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sitecore_get_serialize( + _param = self._index_sigmahq_sigma_rules_get_serialize( page=page, limit=limit, cursor=cursor, @@ -264861,7 +264861,7 @@ async def index_sitecore_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination", '404': "str", '500': "str", } @@ -264877,7 +264877,7 @@ async def index_sitecore_get( @validate_call - async def index_sitecore_get_with_http_info( + async def index_sigmahq_sigma_rules_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -264915,10 +264915,10 @@ async def index_sitecore_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination]: - """Return vulnerability data stored in index \"sitecore\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination]: + """Return vulnerability data stored in index \"sigmahq-sigma-rules\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sitecore index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sitecore Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sitecore?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sitecore?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sigmahq-sigma-rules index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sigma Rules ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sigmahq-sigma-rules?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sigmahq-sigma-rules?cursor=` :param page: set the page number of the response :type page: int @@ -264990,7 +264990,7 @@ async def index_sitecore_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sitecore_get_serialize( + _param = self._index_sigmahq_sigma_rules_get_serialize( page=page, limit=limit, cursor=cursor, @@ -265022,7 +265022,7 @@ async def index_sitecore_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination", '404': "str", '500': "str", } @@ -265038,7 +265038,7 @@ async def index_sitecore_get_with_http_info( @validate_call - async def index_sitecore_get_without_preload_content( + async def index_sigmahq_sigma_rules_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -265077,9 +265077,9 @@ async def index_sitecore_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sitecore\" + """Return vulnerability data stored in index \"sigmahq-sigma-rules\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sitecore index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sitecore Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sitecore?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sitecore?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sigmahq-sigma-rules index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sigma Rules ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sigmahq-sigma-rules?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sigmahq-sigma-rules?cursor=` :param page: set the page number of the response :type page: int @@ -265151,7 +265151,7 @@ async def index_sitecore_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sitecore_get_serialize( + _param = self._index_sigmahq_sigma_rules_get_serialize( page=page, limit=limit, cursor=cursor, @@ -265183,7 +265183,7 @@ async def index_sitecore_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination", '404': "str", '500': "str", } @@ -265194,7 +265194,7 @@ async def index_sitecore_get_without_preload_content( return response_data.response - def _index_sitecore_get_serialize( + def _index_sigmahq_sigma_rules_get_serialize( self, page, limit, @@ -265362,7 +265362,7 @@ def _index_sitecore_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sitecore', + resource_path='/v3/index/sigmahq-sigma-rules', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -265379,7 +265379,7 @@ def _index_sitecore_get_serialize( @validate_call - async def index_slackware_get( + async def index_singcert_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -265417,10 +265417,10 @@ async def index_slackware_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination: - """Return vulnerability data stored in index \"slackware\" + ) -> RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination: + """Return vulnerability data stored in index \"singcert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the slackware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Slackware Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/slackware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/slackware?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the singcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CSA Alerts and Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/singcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/singcert?cursor=` :param page: set the page number of the response :type page: int @@ -265492,7 +265492,7 @@ async def index_slackware_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_slackware_get_serialize( + _param = self._index_singcert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -265524,7 +265524,7 @@ async def index_slackware_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination", '404': "str", '500': "str", } @@ -265540,7 +265540,7 @@ async def index_slackware_get( @validate_call - async def index_slackware_get_with_http_info( + async def index_singcert_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -265578,10 +265578,10 @@ async def index_slackware_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination]: - """Return vulnerability data stored in index \"slackware\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination]: + """Return vulnerability data stored in index \"singcert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the slackware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Slackware Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/slackware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/slackware?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the singcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CSA Alerts and Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/singcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/singcert?cursor=` :param page: set the page number of the response :type page: int @@ -265653,7 +265653,7 @@ async def index_slackware_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_slackware_get_serialize( + _param = self._index_singcert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -265685,7 +265685,7 @@ async def index_slackware_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination", '404': "str", '500': "str", } @@ -265701,7 +265701,7 @@ async def index_slackware_get_with_http_info( @validate_call - async def index_slackware_get_without_preload_content( + async def index_singcert_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -265740,9 +265740,9 @@ async def index_slackware_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"slackware\" + """Return vulnerability data stored in index \"singcert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the slackware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Slackware Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/slackware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/slackware?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the singcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CSA Alerts and Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/singcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/singcert?cursor=` :param page: set the page number of the response :type page: int @@ -265814,7 +265814,7 @@ async def index_slackware_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_slackware_get_serialize( + _param = self._index_singcert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -265846,7 +265846,7 @@ async def index_slackware_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination", '404': "str", '500': "str", } @@ -265857,7 +265857,7 @@ async def index_slackware_get_without_preload_content( return response_data.response - def _index_slackware_get_serialize( + def _index_singcert_get_serialize( self, page, limit, @@ -266025,7 +266025,7 @@ def _index_slackware_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/slackware', + resource_path='/v3/index/singcert', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -266042,7 +266042,7 @@ def _index_slackware_get_serialize( @validate_call - async def index_solarwinds_get( + async def index_sitecore_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -266080,10 +266080,10 @@ async def index_solarwinds_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"solarwinds\" + ) -> RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination: + """Return vulnerability data stored in index \"sitecore\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the solarwinds index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SolarWinds Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/solarwinds?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/solarwinds?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sitecore index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sitecore Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sitecore?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sitecore?cursor=` :param page: set the page number of the response :type page: int @@ -266155,7 +266155,7 @@ async def index_solarwinds_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_solarwinds_get_serialize( + _param = self._index_sitecore_get_serialize( page=page, limit=limit, cursor=cursor, @@ -266187,7 +266187,7 @@ async def index_solarwinds_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination", '404': "str", '500': "str", } @@ -266203,7 +266203,7 @@ async def index_solarwinds_get( @validate_call - async def index_solarwinds_get_with_http_info( + async def index_sitecore_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -266241,10 +266241,10 @@ async def index_solarwinds_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"solarwinds\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination]: + """Return vulnerability data stored in index \"sitecore\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the solarwinds index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SolarWinds Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/solarwinds?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/solarwinds?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sitecore index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sitecore Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sitecore?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sitecore?cursor=` :param page: set the page number of the response :type page: int @@ -266316,7 +266316,7 @@ async def index_solarwinds_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_solarwinds_get_serialize( + _param = self._index_sitecore_get_serialize( page=page, limit=limit, cursor=cursor, @@ -266348,7 +266348,7 @@ async def index_solarwinds_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination", '404': "str", '500': "str", } @@ -266364,7 +266364,7 @@ async def index_solarwinds_get_with_http_info( @validate_call - async def index_solarwinds_get_without_preload_content( + async def index_sitecore_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -266403,9 +266403,9 @@ async def index_solarwinds_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"solarwinds\" + """Return vulnerability data stored in index \"sitecore\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the solarwinds index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SolarWinds Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/solarwinds?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/solarwinds?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sitecore index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sitecore Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sitecore?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sitecore?cursor=` :param page: set the page number of the response :type page: int @@ -266477,7 +266477,7 @@ async def index_solarwinds_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_solarwinds_get_serialize( + _param = self._index_sitecore_get_serialize( page=page, limit=limit, cursor=cursor, @@ -266509,7 +266509,7 @@ async def index_solarwinds_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination", '404': "str", '500': "str", } @@ -266520,7 +266520,7 @@ async def index_solarwinds_get_without_preload_content( return response_data.response - def _index_solarwinds_get_serialize( + def _index_sitecore_get_serialize( self, page, limit, @@ -266688,7 +266688,7 @@ def _index_solarwinds_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/solarwinds', + resource_path='/v3/index/sitecore', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -266705,7 +266705,7 @@ def _index_solarwinds_get_serialize( @validate_call - async def index_solr_get( + async def index_slackware_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -266743,10 +266743,10 @@ async def index_solr_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination: - """Return vulnerability data stored in index \"solr\" + ) -> RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination: + """Return vulnerability data stored in index \"slackware\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the solr index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Solr CVE Reports ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/solr?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/solr?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the slackware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Slackware Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/slackware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/slackware?cursor=` :param page: set the page number of the response :type page: int @@ -266818,7 +266818,7 @@ async def index_solr_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_solr_get_serialize( + _param = self._index_slackware_get_serialize( page=page, limit=limit, cursor=cursor, @@ -266850,7 +266850,7 @@ async def index_solr_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination", '404': "str", '500': "str", } @@ -266866,7 +266866,7 @@ async def index_solr_get( @validate_call - async def index_solr_get_with_http_info( + async def index_slackware_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -266904,10 +266904,10 @@ async def index_solr_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination]: - """Return vulnerability data stored in index \"solr\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination]: + """Return vulnerability data stored in index \"slackware\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the solr index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Solr CVE Reports ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/solr?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/solr?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the slackware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Slackware Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/slackware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/slackware?cursor=` :param page: set the page number of the response :type page: int @@ -266979,7 +266979,7 @@ async def index_solr_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_solr_get_serialize( + _param = self._index_slackware_get_serialize( page=page, limit=limit, cursor=cursor, @@ -267011,7 +267011,7 @@ async def index_solr_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination", '404': "str", '500': "str", } @@ -267027,7 +267027,7 @@ async def index_solr_get_with_http_info( @validate_call - async def index_solr_get_without_preload_content( + async def index_slackware_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -267066,9 +267066,9 @@ async def index_solr_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"solr\" + """Return vulnerability data stored in index \"slackware\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the solr index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Solr CVE Reports ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/solr?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/solr?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the slackware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Slackware Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/slackware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/slackware?cursor=` :param page: set the page number of the response :type page: int @@ -267140,7 +267140,7 @@ async def index_solr_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_solr_get_serialize( + _param = self._index_slackware_get_serialize( page=page, limit=limit, cursor=cursor, @@ -267172,7 +267172,7 @@ async def index_solr_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination", '404': "str", '500': "str", } @@ -267183,7 +267183,7 @@ async def index_solr_get_without_preload_content( return response_data.response - def _index_solr_get_serialize( + def _index_slackware_get_serialize( self, page, limit, @@ -267351,7 +267351,7 @@ def _index_solr_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/solr', + resource_path='/v3/index/slackware', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -267368,7 +267368,7 @@ def _index_solr_get_serialize( @validate_call - async def index_sonatype_get( + async def index_solarwinds_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -267406,10 +267406,10 @@ async def index_sonatype_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination: - """Return vulnerability data stored in index \"sonatype\" + ) -> RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"solarwinds\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sonatype index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sonatype Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sonatype?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sonatype?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the solarwinds index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SolarWinds Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/solarwinds?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/solarwinds?cursor=` :param page: set the page number of the response :type page: int @@ -267481,7 +267481,7 @@ async def index_sonatype_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sonatype_get_serialize( + _param = self._index_solarwinds_get_serialize( page=page, limit=limit, cursor=cursor, @@ -267513,7 +267513,7 @@ async def index_sonatype_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -267529,7 +267529,7 @@ async def index_sonatype_get( @validate_call - async def index_sonatype_get_with_http_info( + async def index_solarwinds_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -267567,10 +267567,10 @@ async def index_sonatype_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination]: - """Return vulnerability data stored in index \"sonatype\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"solarwinds\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sonatype index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sonatype Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sonatype?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sonatype?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the solarwinds index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SolarWinds Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/solarwinds?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/solarwinds?cursor=` :param page: set the page number of the response :type page: int @@ -267642,7 +267642,7 @@ async def index_sonatype_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sonatype_get_serialize( + _param = self._index_solarwinds_get_serialize( page=page, limit=limit, cursor=cursor, @@ -267674,7 +267674,7 @@ async def index_sonatype_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -267690,7 +267690,7 @@ async def index_sonatype_get_with_http_info( @validate_call - async def index_sonatype_get_without_preload_content( + async def index_solarwinds_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -267729,9 +267729,9 @@ async def index_sonatype_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sonatype\" + """Return vulnerability data stored in index \"solarwinds\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sonatype index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sonatype Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sonatype?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sonatype?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the solarwinds index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SolarWinds Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/solarwinds?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/solarwinds?cursor=` :param page: set the page number of the response :type page: int @@ -267803,7 +267803,7 @@ async def index_sonatype_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sonatype_get_serialize( + _param = self._index_solarwinds_get_serialize( page=page, limit=limit, cursor=cursor, @@ -267835,7 +267835,7 @@ async def index_sonatype_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -267846,7 +267846,7 @@ async def index_sonatype_get_without_preload_content( return response_data.response - def _index_sonatype_get_serialize( + def _index_solarwinds_get_serialize( self, page, limit, @@ -268014,7 +268014,7 @@ def _index_sonatype_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sonatype', + resource_path='/v3/index/solarwinds', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -268031,7 +268031,7 @@ def _index_sonatype_get_serialize( @validate_call - async def index_sonicwall_get( + async def index_solr_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -268069,10 +268069,10 @@ async def index_sonicwall_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"sonicwall\" + ) -> RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination: + """Return vulnerability data stored in index \"solr\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sonicwall index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SonicWall Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sonicwall?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sonicwall?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the solr index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Solr CVE Reports ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/solr?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/solr?cursor=` :param page: set the page number of the response :type page: int @@ -268144,7 +268144,7 @@ async def index_sonicwall_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sonicwall_get_serialize( + _param = self._index_solr_get_serialize( page=page, limit=limit, cursor=cursor, @@ -268176,7 +268176,7 @@ async def index_sonicwall_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination", '404': "str", '500': "str", } @@ -268192,7 +268192,7 @@ async def index_sonicwall_get( @validate_call - async def index_sonicwall_get_with_http_info( + async def index_solr_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -268230,10 +268230,10 @@ async def index_sonicwall_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"sonicwall\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination]: + """Return vulnerability data stored in index \"solr\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sonicwall index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SonicWall Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sonicwall?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sonicwall?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the solr index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Solr CVE Reports ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/solr?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/solr?cursor=` :param page: set the page number of the response :type page: int @@ -268305,7 +268305,7 @@ async def index_sonicwall_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sonicwall_get_serialize( + _param = self._index_solr_get_serialize( page=page, limit=limit, cursor=cursor, @@ -268337,7 +268337,7 @@ async def index_sonicwall_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination", '404': "str", '500': "str", } @@ -268353,7 +268353,7 @@ async def index_sonicwall_get_with_http_info( @validate_call - async def index_sonicwall_get_without_preload_content( + async def index_solr_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -268392,9 +268392,9 @@ async def index_sonicwall_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sonicwall\" + """Return vulnerability data stored in index \"solr\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sonicwall index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SonicWall Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sonicwall?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sonicwall?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the solr index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Solr CVE Reports ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/solr?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/solr?cursor=` :param page: set the page number of the response :type page: int @@ -268466,7 +268466,7 @@ async def index_sonicwall_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sonicwall_get_serialize( + _param = self._index_solr_get_serialize( page=page, limit=limit, cursor=cursor, @@ -268498,7 +268498,7 @@ async def index_sonicwall_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination", '404': "str", '500': "str", } @@ -268509,7 +268509,7 @@ async def index_sonicwall_get_without_preload_content( return response_data.response - def _index_sonicwall_get_serialize( + def _index_solr_get_serialize( self, page, limit, @@ -268677,7 +268677,7 @@ def _index_sonicwall_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sonicwall', + resource_path='/v3/index/solr', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -268694,7 +268694,7 @@ def _index_sonicwall_get_serialize( @validate_call - async def index_spacelabs_healthcare_get( + async def index_sonatype_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -268732,10 +268732,10 @@ async def index_spacelabs_healthcare_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"spacelabs-healthcare\" + ) -> RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination: + """Return vulnerability data stored in index \"sonatype\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the spacelabs-healthcare index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Spacelabs Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/spacelabs-healthcare?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/spacelabs-healthcare?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sonatype index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sonatype Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sonatype?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sonatype?cursor=` :param page: set the page number of the response :type page: int @@ -268807,7 +268807,7 @@ async def index_spacelabs_healthcare_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_spacelabs_healthcare_get_serialize( + _param = self._index_sonatype_get_serialize( page=page, limit=limit, cursor=cursor, @@ -268839,7 +268839,7 @@ async def index_spacelabs_healthcare_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination", '404': "str", '500': "str", } @@ -268855,7 +268855,7 @@ async def index_spacelabs_healthcare_get( @validate_call - async def index_spacelabs_healthcare_get_with_http_info( + async def index_sonatype_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -268893,10 +268893,10 @@ async def index_spacelabs_healthcare_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"spacelabs-healthcare\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination]: + """Return vulnerability data stored in index \"sonatype\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the spacelabs-healthcare index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Spacelabs Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/spacelabs-healthcare?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/spacelabs-healthcare?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sonatype index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sonatype Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sonatype?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sonatype?cursor=` :param page: set the page number of the response :type page: int @@ -268968,7 +268968,7 @@ async def index_spacelabs_healthcare_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_spacelabs_healthcare_get_serialize( + _param = self._index_sonatype_get_serialize( page=page, limit=limit, cursor=cursor, @@ -269000,7 +269000,7 @@ async def index_spacelabs_healthcare_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination", '404': "str", '500': "str", } @@ -269016,7 +269016,7 @@ async def index_spacelabs_healthcare_get_with_http_info( @validate_call - async def index_spacelabs_healthcare_get_without_preload_content( + async def index_sonatype_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -269055,9 +269055,9 @@ async def index_spacelabs_healthcare_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"spacelabs-healthcare\" + """Return vulnerability data stored in index \"sonatype\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the spacelabs-healthcare index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Spacelabs Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/spacelabs-healthcare?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/spacelabs-healthcare?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sonatype index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sonatype Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sonatype?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sonatype?cursor=` :param page: set the page number of the response :type page: int @@ -269129,7 +269129,7 @@ async def index_spacelabs_healthcare_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_spacelabs_healthcare_get_serialize( + _param = self._index_sonatype_get_serialize( page=page, limit=limit, cursor=cursor, @@ -269161,7 +269161,7 @@ async def index_spacelabs_healthcare_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination", '404': "str", '500': "str", } @@ -269172,7 +269172,7 @@ async def index_spacelabs_healthcare_get_without_preload_content( return response_data.response - def _index_spacelabs_healthcare_get_serialize( + def _index_sonatype_get_serialize( self, page, limit, @@ -269340,7 +269340,7 @@ def _index_spacelabs_healthcare_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/spacelabs-healthcare', + resource_path='/v3/index/sonatype', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -269357,7 +269357,7 @@ def _index_spacelabs_healthcare_get_serialize( @validate_call - async def index_splunk_get( + async def index_sonicwall_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -269395,10 +269395,10 @@ async def index_splunk_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination: - """Return vulnerability data stored in index \"splunk\" + ) -> RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"sonicwall\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the splunk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Splunk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/splunk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/splunk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sonicwall index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SonicWall Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sonicwall?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sonicwall?cursor=` :param page: set the page number of the response :type page: int @@ -269470,7 +269470,7 @@ async def index_splunk_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_splunk_get_serialize( + _param = self._index_sonicwall_get_serialize( page=page, limit=limit, cursor=cursor, @@ -269502,7 +269502,7 @@ async def index_splunk_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -269518,7 +269518,7 @@ async def index_splunk_get( @validate_call - async def index_splunk_get_with_http_info( + async def index_sonicwall_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -269556,10 +269556,10 @@ async def index_splunk_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination]: - """Return vulnerability data stored in index \"splunk\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"sonicwall\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the splunk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Splunk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/splunk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/splunk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sonicwall index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SonicWall Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sonicwall?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sonicwall?cursor=` :param page: set the page number of the response :type page: int @@ -269631,7 +269631,7 @@ async def index_splunk_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_splunk_get_serialize( + _param = self._index_sonicwall_get_serialize( page=page, limit=limit, cursor=cursor, @@ -269663,7 +269663,7 @@ async def index_splunk_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -269679,7 +269679,7 @@ async def index_splunk_get_with_http_info( @validate_call - async def index_splunk_get_without_preload_content( + async def index_sonicwall_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -269718,9 +269718,9 @@ async def index_splunk_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"splunk\" + """Return vulnerability data stored in index \"sonicwall\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the splunk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Splunk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/splunk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/splunk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sonicwall index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SonicWall Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sonicwall?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sonicwall?cursor=` :param page: set the page number of the response :type page: int @@ -269792,7 +269792,7 @@ async def index_splunk_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_splunk_get_serialize( + _param = self._index_sonicwall_get_serialize( page=page, limit=limit, cursor=cursor, @@ -269824,7 +269824,7 @@ async def index_splunk_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -269835,7 +269835,7 @@ async def index_splunk_get_without_preload_content( return response_data.response - def _index_splunk_get_serialize( + def _index_sonicwall_get_serialize( self, page, limit, @@ -270003,7 +270003,7 @@ def _index_splunk_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/splunk', + resource_path='/v3/index/sonicwall', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -270020,7 +270020,7 @@ def _index_splunk_get_serialize( @validate_call - async def index_spring_get( + async def index_spacelabs_healthcare_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -270058,10 +270058,10 @@ async def index_spring_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination: - """Return vulnerability data stored in index \"spring\" + ) -> RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"spacelabs-healthcare\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the spring index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Spring Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/spring?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/spring?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the spacelabs-healthcare index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Spacelabs Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/spacelabs-healthcare?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/spacelabs-healthcare?cursor=` :param page: set the page number of the response :type page: int @@ -270133,7 +270133,7 @@ async def index_spring_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_spring_get_serialize( + _param = self._index_spacelabs_healthcare_get_serialize( page=page, limit=limit, cursor=cursor, @@ -270165,7 +270165,7 @@ async def index_spring_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -270181,7 +270181,7 @@ async def index_spring_get( @validate_call - async def index_spring_get_with_http_info( + async def index_spacelabs_healthcare_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -270219,10 +270219,10 @@ async def index_spring_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination]: - """Return vulnerability data stored in index \"spring\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"spacelabs-healthcare\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the spring index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Spring Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/spring?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/spring?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the spacelabs-healthcare index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Spacelabs Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/spacelabs-healthcare?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/spacelabs-healthcare?cursor=` :param page: set the page number of the response :type page: int @@ -270294,7 +270294,7 @@ async def index_spring_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_spring_get_serialize( + _param = self._index_spacelabs_healthcare_get_serialize( page=page, limit=limit, cursor=cursor, @@ -270326,7 +270326,7 @@ async def index_spring_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -270342,7 +270342,7 @@ async def index_spring_get_with_http_info( @validate_call - async def index_spring_get_without_preload_content( + async def index_spacelabs_healthcare_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -270381,9 +270381,9 @@ async def index_spring_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"spring\" + """Return vulnerability data stored in index \"spacelabs-healthcare\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the spring index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Spring Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/spring?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/spring?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the spacelabs-healthcare index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Spacelabs Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/spacelabs-healthcare?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/spacelabs-healthcare?cursor=` :param page: set the page number of the response :type page: int @@ -270455,7 +270455,7 @@ async def index_spring_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_spring_get_serialize( + _param = self._index_spacelabs_healthcare_get_serialize( page=page, limit=limit, cursor=cursor, @@ -270487,7 +270487,7 @@ async def index_spring_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -270498,7 +270498,7 @@ async def index_spring_get_without_preload_content( return response_data.response - def _index_spring_get_serialize( + def _index_spacelabs_healthcare_get_serialize( self, page, limit, @@ -270666,7 +270666,7 @@ def _index_spring_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/spring', + resource_path='/v3/index/spacelabs-healthcare', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -270683,7 +270683,7 @@ def _index_spring_get_serialize( @validate_call - async def index_ssd_get( + async def index_splunk_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -270721,10 +270721,10 @@ async def index_ssd_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"ssd\" + ) -> RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination: + """Return vulnerability data stored in index \"splunk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ssd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SSD Secure Disclosure Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ssd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ssd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the splunk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Splunk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/splunk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/splunk?cursor=` :param page: set the page number of the response :type page: int @@ -270796,7 +270796,7 @@ async def index_ssd_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ssd_get_serialize( + _param = self._index_splunk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -270828,7 +270828,7 @@ async def index_ssd_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination", '404': "str", '500': "str", } @@ -270844,7 +270844,7 @@ async def index_ssd_get( @validate_call - async def index_ssd_get_with_http_info( + async def index_splunk_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -270882,10 +270882,10 @@ async def index_ssd_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"ssd\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination]: + """Return vulnerability data stored in index \"splunk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ssd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SSD Secure Disclosure Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ssd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ssd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the splunk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Splunk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/splunk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/splunk?cursor=` :param page: set the page number of the response :type page: int @@ -270957,7 +270957,7 @@ async def index_ssd_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ssd_get_serialize( + _param = self._index_splunk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -270989,7 +270989,7 @@ async def index_ssd_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination", '404': "str", '500': "str", } @@ -271005,7 +271005,7 @@ async def index_ssd_get_with_http_info( @validate_call - async def index_ssd_get_without_preload_content( + async def index_splunk_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -271044,9 +271044,9 @@ async def index_ssd_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ssd\" + """Return vulnerability data stored in index \"splunk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ssd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SSD Secure Disclosure Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ssd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ssd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the splunk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Splunk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/splunk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/splunk?cursor=` :param page: set the page number of the response :type page: int @@ -271118,7 +271118,7 @@ async def index_ssd_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ssd_get_serialize( + _param = self._index_splunk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -271150,7 +271150,7 @@ async def index_ssd_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination", '404': "str", '500': "str", } @@ -271161,7 +271161,7 @@ async def index_ssd_get_without_preload_content( return response_data.response - def _index_ssd_get_serialize( + def _index_splunk_get_serialize( self, page, limit, @@ -271329,7 +271329,7 @@ def _index_ssd_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ssd', + resource_path='/v3/index/splunk', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -271346,7 +271346,7 @@ def _index_ssd_get_serialize( @validate_call - async def index_stormshield_get( + async def index_spring_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -271384,10 +271384,10 @@ async def index_stormshield_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination: - """Return vulnerability data stored in index \"stormshield\" + ) -> RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination: + """Return vulnerability data stored in index \"spring\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the stormshield index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Stormshield Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/stormshield?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/stormshield?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the spring index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Spring Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/spring?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/spring?cursor=` :param page: set the page number of the response :type page: int @@ -271459,7 +271459,7 @@ async def index_stormshield_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_stormshield_get_serialize( + _param = self._index_spring_get_serialize( page=page, limit=limit, cursor=cursor, @@ -271491,7 +271491,7 @@ async def index_stormshield_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination", '404': "str", '500': "str", } @@ -271507,7 +271507,7 @@ async def index_stormshield_get( @validate_call - async def index_stormshield_get_with_http_info( + async def index_spring_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -271545,10 +271545,10 @@ async def index_stormshield_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination]: - """Return vulnerability data stored in index \"stormshield\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination]: + """Return vulnerability data stored in index \"spring\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the stormshield index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Stormshield Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/stormshield?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/stormshield?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the spring index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Spring Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/spring?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/spring?cursor=` :param page: set the page number of the response :type page: int @@ -271620,7 +271620,7 @@ async def index_stormshield_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_stormshield_get_serialize( + _param = self._index_spring_get_serialize( page=page, limit=limit, cursor=cursor, @@ -271652,7 +271652,7 @@ async def index_stormshield_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination", '404': "str", '500': "str", } @@ -271668,7 +271668,7 @@ async def index_stormshield_get_with_http_info( @validate_call - async def index_stormshield_get_without_preload_content( + async def index_spring_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -271707,9 +271707,9 @@ async def index_stormshield_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"stormshield\" + """Return vulnerability data stored in index \"spring\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the stormshield index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Stormshield Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/stormshield?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/stormshield?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the spring index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Spring Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/spring?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/spring?cursor=` :param page: set the page number of the response :type page: int @@ -271781,7 +271781,7 @@ async def index_stormshield_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_stormshield_get_serialize( + _param = self._index_spring_get_serialize( page=page, limit=limit, cursor=cursor, @@ -271813,7 +271813,7 @@ async def index_stormshield_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination", '404': "str", '500': "str", } @@ -271824,7 +271824,7 @@ async def index_stormshield_get_without_preload_content( return response_data.response - def _index_stormshield_get_serialize( + def _index_spring_get_serialize( self, page, limit, @@ -271992,7 +271992,7 @@ def _index_stormshield_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/stormshield', + resource_path='/v3/index/spring', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -272009,7 +272009,7 @@ def _index_stormshield_get_serialize( @validate_call - async def index_stryker_get( + async def index_ssd_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -272047,10 +272047,10 @@ async def index_stryker_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"stryker\" + ) -> RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"ssd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the stryker index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Stryker Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/stryker?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/stryker?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ssd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SSD Secure Disclosure Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ssd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ssd?cursor=` :param page: set the page number of the response :type page: int @@ -272122,7 +272122,7 @@ async def index_stryker_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_stryker_get_serialize( + _param = self._index_ssd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -272154,7 +272154,7 @@ async def index_stryker_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -272170,7 +272170,7 @@ async def index_stryker_get( @validate_call - async def index_stryker_get_with_http_info( + async def index_ssd_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -272208,10 +272208,10 @@ async def index_stryker_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"stryker\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"ssd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the stryker index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Stryker Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/stryker?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/stryker?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ssd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SSD Secure Disclosure Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ssd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ssd?cursor=` :param page: set the page number of the response :type page: int @@ -272283,7 +272283,7 @@ async def index_stryker_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_stryker_get_serialize( + _param = self._index_ssd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -272315,7 +272315,7 @@ async def index_stryker_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -272331,7 +272331,7 @@ async def index_stryker_get_with_http_info( @validate_call - async def index_stryker_get_without_preload_content( + async def index_ssd_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -272370,9 +272370,9 @@ async def index_stryker_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"stryker\" + """Return vulnerability data stored in index \"ssd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the stryker index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Stryker Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/stryker?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/stryker?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ssd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SSD Secure Disclosure Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ssd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ssd?cursor=` :param page: set the page number of the response :type page: int @@ -272444,7 +272444,7 @@ async def index_stryker_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_stryker_get_serialize( + _param = self._index_ssd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -272476,7 +272476,7 @@ async def index_stryker_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -272487,7 +272487,7 @@ async def index_stryker_get_without_preload_content( return response_data.response - def _index_stryker_get_serialize( + def _index_ssd_get_serialize( self, page, limit, @@ -272655,7 +272655,7 @@ def _index_stryker_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/stryker', + resource_path='/v3/index/ssd', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -272672,7 +272672,7 @@ def _index_stryker_get_serialize( @validate_call - async def index_sudo_get( + async def index_stormshield_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -272710,10 +272710,10 @@ async def index_sudo_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination: - """Return vulnerability data stored in index \"sudo\" + ) -> RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination: + """Return vulnerability data stored in index \"stormshield\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sudo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sudo Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sudo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sudo?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the stormshield index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Stormshield Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/stormshield?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/stormshield?cursor=` :param page: set the page number of the response :type page: int @@ -272785,7 +272785,7 @@ async def index_sudo_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sudo_get_serialize( + _param = self._index_stormshield_get_serialize( page=page, limit=limit, cursor=cursor, @@ -272817,7 +272817,7 @@ async def index_sudo_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination", '404': "str", '500': "str", } @@ -272833,7 +272833,7 @@ async def index_sudo_get( @validate_call - async def index_sudo_get_with_http_info( + async def index_stormshield_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -272871,10 +272871,10 @@ async def index_sudo_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination]: - """Return vulnerability data stored in index \"sudo\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination]: + """Return vulnerability data stored in index \"stormshield\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sudo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sudo Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sudo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sudo?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the stormshield index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Stormshield Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/stormshield?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/stormshield?cursor=` :param page: set the page number of the response :type page: int @@ -272946,7 +272946,7 @@ async def index_sudo_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sudo_get_serialize( + _param = self._index_stormshield_get_serialize( page=page, limit=limit, cursor=cursor, @@ -272978,7 +272978,7 @@ async def index_sudo_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination", '404': "str", '500': "str", } @@ -272994,7 +272994,7 @@ async def index_sudo_get_with_http_info( @validate_call - async def index_sudo_get_without_preload_content( + async def index_stormshield_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -273033,9 +273033,9 @@ async def index_sudo_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sudo\" + """Return vulnerability data stored in index \"stormshield\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sudo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sudo Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sudo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sudo?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the stormshield index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Stormshield Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/stormshield?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/stormshield?cursor=` :param page: set the page number of the response :type page: int @@ -273107,7 +273107,7 @@ async def index_sudo_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sudo_get_serialize( + _param = self._index_stormshield_get_serialize( page=page, limit=limit, cursor=cursor, @@ -273139,7 +273139,7 @@ async def index_sudo_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination", '404': "str", '500': "str", } @@ -273150,7 +273150,7 @@ async def index_sudo_get_without_preload_content( return response_data.response - def _index_sudo_get_serialize( + def _index_stormshield_get_serialize( self, page, limit, @@ -273318,7 +273318,7 @@ def _index_sudo_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sudo', + resource_path='/v3/index/stormshield', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -273335,7 +273335,7 @@ def _index_sudo_get_serialize( @validate_call - async def index_suse_get( + async def index_stryker_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -273373,10 +273373,10 @@ async def index_suse_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination: - """Return vulnerability data stored in index \"suse\" + ) -> RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"stryker\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the suse index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SUSE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/suse?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/suse?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the stryker index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Stryker Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/stryker?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/stryker?cursor=` :param page: set the page number of the response :type page: int @@ -273448,7 +273448,7 @@ async def index_suse_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_suse_get_serialize( + _param = self._index_stryker_get_serialize( page=page, limit=limit, cursor=cursor, @@ -273480,7 +273480,7 @@ async def index_suse_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -273496,7 +273496,7 @@ async def index_suse_get( @validate_call - async def index_suse_get_with_http_info( + async def index_stryker_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -273534,10 +273534,10 @@ async def index_suse_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination]: - """Return vulnerability data stored in index \"suse\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"stryker\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the suse index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SUSE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/suse?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/suse?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the stryker index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Stryker Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/stryker?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/stryker?cursor=` :param page: set the page number of the response :type page: int @@ -273609,7 +273609,7 @@ async def index_suse_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_suse_get_serialize( + _param = self._index_stryker_get_serialize( page=page, limit=limit, cursor=cursor, @@ -273641,7 +273641,7 @@ async def index_suse_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -273657,7 +273657,7 @@ async def index_suse_get_with_http_info( @validate_call - async def index_suse_get_without_preload_content( + async def index_stryker_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -273696,9 +273696,9 @@ async def index_suse_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"suse\" + """Return vulnerability data stored in index \"stryker\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the suse index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SUSE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/suse?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/suse?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the stryker index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Stryker Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/stryker?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/stryker?cursor=` :param page: set the page number of the response :type page: int @@ -273770,7 +273770,7 @@ async def index_suse_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_suse_get_serialize( + _param = self._index_stryker_get_serialize( page=page, limit=limit, cursor=cursor, @@ -273802,7 +273802,7 @@ async def index_suse_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -273813,7 +273813,7 @@ async def index_suse_get_without_preload_content( return response_data.response - def _index_suse_get_serialize( + def _index_stryker_get_serialize( self, page, limit, @@ -273981,7 +273981,7 @@ def _index_suse_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/suse', + resource_path='/v3/index/stryker', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -273998,7 +273998,7 @@ def _index_suse_get_serialize( @validate_call - async def index_suse_security_get( + async def index_sudo_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -274036,10 +274036,10 @@ async def index_suse_security_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination: - """Return vulnerability data stored in index \"suse-security\" + ) -> RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination: + """Return vulnerability data stored in index \"sudo\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the suse-security index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Suse Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/suse-security?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/suse-security?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sudo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sudo Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sudo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sudo?cursor=` :param page: set the page number of the response :type page: int @@ -274111,7 +274111,7 @@ async def index_suse_security_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_suse_security_get_serialize( + _param = self._index_sudo_get_serialize( page=page, limit=limit, cursor=cursor, @@ -274143,7 +274143,7 @@ async def index_suse_security_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination", '404': "str", '500': "str", } @@ -274159,7 +274159,7 @@ async def index_suse_security_get( @validate_call - async def index_suse_security_get_with_http_info( + async def index_sudo_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -274197,10 +274197,10 @@ async def index_suse_security_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination]: - """Return vulnerability data stored in index \"suse-security\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination]: + """Return vulnerability data stored in index \"sudo\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the suse-security index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Suse Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/suse-security?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/suse-security?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sudo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sudo Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sudo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sudo?cursor=` :param page: set the page number of the response :type page: int @@ -274272,7 +274272,7 @@ async def index_suse_security_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_suse_security_get_serialize( + _param = self._index_sudo_get_serialize( page=page, limit=limit, cursor=cursor, @@ -274304,7 +274304,7 @@ async def index_suse_security_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination", '404': "str", '500': "str", } @@ -274320,7 +274320,7 @@ async def index_suse_security_get_with_http_info( @validate_call - async def index_suse_security_get_without_preload_content( + async def index_sudo_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -274359,9 +274359,9 @@ async def index_suse_security_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"suse-security\" + """Return vulnerability data stored in index \"sudo\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the suse-security index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Suse Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/suse-security?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/suse-security?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sudo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sudo Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sudo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sudo?cursor=` :param page: set the page number of the response :type page: int @@ -274433,7 +274433,7 @@ async def index_suse_security_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_suse_security_get_serialize( + _param = self._index_sudo_get_serialize( page=page, limit=limit, cursor=cursor, @@ -274465,7 +274465,7 @@ async def index_suse_security_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination", '404': "str", '500': "str", } @@ -274476,7 +274476,7 @@ async def index_suse_security_get_without_preload_content( return response_data.response - def _index_suse_security_get_serialize( + def _index_sudo_get_serialize( self, page, limit, @@ -274644,7 +274644,7 @@ def _index_suse_security_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/suse-security', + resource_path='/v3/index/sudo', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -274661,7 +274661,7 @@ def _index_suse_security_get_serialize( @validate_call - async def index_swift_get( + async def index_suse_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -274699,10 +274699,10 @@ async def index_swift_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: - """Return vulnerability data stored in index \"swift\" + ) -> RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination: + """Return vulnerability data stored in index \"suse\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the swift index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Swift packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/swift?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/swift?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the suse index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SUSE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/suse?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/suse?cursor=` :param page: set the page number of the response :type page: int @@ -274774,7 +274774,7 @@ async def index_swift_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_swift_get_serialize( + _param = self._index_suse_get_serialize( page=page, limit=limit, cursor=cursor, @@ -274806,7 +274806,7 @@ async def index_swift_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination", '404': "str", '500': "str", } @@ -274822,7 +274822,7 @@ async def index_swift_get( @validate_call - async def index_swift_get_with_http_info( + async def index_suse_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -274860,10 +274860,10 @@ async def index_swift_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: - """Return vulnerability data stored in index \"swift\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination]: + """Return vulnerability data stored in index \"suse\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the swift index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Swift packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/swift?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/swift?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the suse index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SUSE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/suse?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/suse?cursor=` :param page: set the page number of the response :type page: int @@ -274935,7 +274935,7 @@ async def index_swift_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_swift_get_serialize( + _param = self._index_suse_get_serialize( page=page, limit=limit, cursor=cursor, @@ -274967,7 +274967,7 @@ async def index_swift_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination", '404': "str", '500': "str", } @@ -274983,7 +274983,7 @@ async def index_swift_get_with_http_info( @validate_call - async def index_swift_get_without_preload_content( + async def index_suse_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -275022,9 +275022,9 @@ async def index_swift_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"swift\" + """Return vulnerability data stored in index \"suse\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the swift index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Swift packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/swift?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/swift?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the suse index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SUSE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/suse?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/suse?cursor=` :param page: set the page number of the response :type page: int @@ -275096,7 +275096,7 @@ async def index_swift_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_swift_get_serialize( + _param = self._index_suse_get_serialize( page=page, limit=limit, cursor=cursor, @@ -275128,7 +275128,7 @@ async def index_swift_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination", '404': "str", '500': "str", } @@ -275139,7 +275139,7 @@ async def index_swift_get_without_preload_content( return response_data.response - def _index_swift_get_serialize( + def _index_suse_get_serialize( self, page, limit, @@ -275307,7 +275307,7 @@ def _index_swift_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/swift', + resource_path='/v3/index/suse', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -275324,7 +275324,7 @@ def _index_swift_get_serialize( @validate_call - async def index_swisslog_healthcare_get( + async def index_suse_security_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -275362,10 +275362,10 @@ async def index_swisslog_healthcare_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"swisslog-healthcare\" + ) -> RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination: + """Return vulnerability data stored in index \"suse-security\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the swisslog-healthcare index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Swisslog Healthcare CVE Disclosures ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/swisslog-healthcare?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/swisslog-healthcare?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the suse-security index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Suse Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/suse-security?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/suse-security?cursor=` :param page: set the page number of the response :type page: int @@ -275437,7 +275437,7 @@ async def index_swisslog_healthcare_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_swisslog_healthcare_get_serialize( + _param = self._index_suse_security_get_serialize( page=page, limit=limit, cursor=cursor, @@ -275469,7 +275469,7 @@ async def index_swisslog_healthcare_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination", '404': "str", '500': "str", } @@ -275485,7 +275485,7 @@ async def index_swisslog_healthcare_get( @validate_call - async def index_swisslog_healthcare_get_with_http_info( + async def index_suse_security_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -275523,10 +275523,10 @@ async def index_swisslog_healthcare_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"swisslog-healthcare\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination]: + """Return vulnerability data stored in index \"suse-security\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the swisslog-healthcare index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Swisslog Healthcare CVE Disclosures ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/swisslog-healthcare?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/swisslog-healthcare?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the suse-security index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Suse Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/suse-security?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/suse-security?cursor=` :param page: set the page number of the response :type page: int @@ -275598,7 +275598,7 @@ async def index_swisslog_healthcare_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_swisslog_healthcare_get_serialize( + _param = self._index_suse_security_get_serialize( page=page, limit=limit, cursor=cursor, @@ -275630,7 +275630,7 @@ async def index_swisslog_healthcare_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination", '404': "str", '500': "str", } @@ -275646,7 +275646,7 @@ async def index_swisslog_healthcare_get_with_http_info( @validate_call - async def index_swisslog_healthcare_get_without_preload_content( + async def index_suse_security_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -275685,9 +275685,9 @@ async def index_swisslog_healthcare_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"swisslog-healthcare\" + """Return vulnerability data stored in index \"suse-security\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the swisslog-healthcare index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Swisslog Healthcare CVE Disclosures ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/swisslog-healthcare?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/swisslog-healthcare?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the suse-security index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Suse Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/suse-security?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/suse-security?cursor=` :param page: set the page number of the response :type page: int @@ -275759,7 +275759,7 @@ async def index_swisslog_healthcare_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_swisslog_healthcare_get_serialize( + _param = self._index_suse_security_get_serialize( page=page, limit=limit, cursor=cursor, @@ -275791,7 +275791,7 @@ async def index_swisslog_healthcare_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination", '404': "str", '500': "str", } @@ -275802,7 +275802,7 @@ async def index_swisslog_healthcare_get_without_preload_content( return response_data.response - def _index_swisslog_healthcare_get_serialize( + def _index_suse_security_get_serialize( self, page, limit, @@ -275970,7 +275970,7 @@ def _index_swisslog_healthcare_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/swisslog-healthcare', + resource_path='/v3/index/suse-security', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -275987,7 +275987,7 @@ def _index_swisslog_healthcare_get_serialize( @validate_call - async def index_symfony_get( + async def index_swift_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -276025,10 +276025,10 @@ async def index_symfony_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination: - """Return vulnerability data stored in index \"symfony\" + ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: + """Return vulnerability data stored in index \"swift\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the symfony index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Symfony Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/symfony?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/symfony?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the swift index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Swift packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/swift?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/swift?cursor=` :param page: set the page number of the response :type page: int @@ -276100,7 +276100,7 @@ async def index_symfony_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_symfony_get_serialize( + _param = self._index_swift_get_serialize( page=page, limit=limit, cursor=cursor, @@ -276132,7 +276132,7 @@ async def index_symfony_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -276148,7 +276148,7 @@ async def index_symfony_get( @validate_call - async def index_symfony_get_with_http_info( + async def index_swift_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -276186,10 +276186,10 @@ async def index_symfony_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination]: - """Return vulnerability data stored in index \"symfony\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: + """Return vulnerability data stored in index \"swift\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the symfony index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Symfony Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/symfony?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/symfony?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the swift index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Swift packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/swift?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/swift?cursor=` :param page: set the page number of the response :type page: int @@ -276261,7 +276261,7 @@ async def index_symfony_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_symfony_get_serialize( + _param = self._index_swift_get_serialize( page=page, limit=limit, cursor=cursor, @@ -276293,7 +276293,7 @@ async def index_symfony_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -276309,7 +276309,7 @@ async def index_symfony_get_with_http_info( @validate_call - async def index_symfony_get_without_preload_content( + async def index_swift_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -276348,9 +276348,9 @@ async def index_symfony_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"symfony\" + """Return vulnerability data stored in index \"swift\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the symfony index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Symfony Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/symfony?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/symfony?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the swift index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Swift packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/swift?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/swift?cursor=` :param page: set the page number of the response :type page: int @@ -276422,7 +276422,7 @@ async def index_symfony_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_symfony_get_serialize( + _param = self._index_swift_get_serialize( page=page, limit=limit, cursor=cursor, @@ -276454,7 +276454,7 @@ async def index_symfony_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -276465,7 +276465,7 @@ async def index_symfony_get_without_preload_content( return response_data.response - def _index_symfony_get_serialize( + def _index_swift_get_serialize( self, page, limit, @@ -276633,7 +276633,7 @@ def _index_symfony_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/symfony', + resource_path='/v3/index/swift', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -276650,7 +276650,7 @@ def _index_symfony_get_serialize( @validate_call - async def index_synacktiv_get( + async def index_swisslog_healthcare_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -276688,10 +276688,10 @@ async def index_synacktiv_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination: - """Return vulnerability data stored in index \"synacktiv\" + ) -> RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"swisslog-healthcare\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the synacktiv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Synacktiv Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/synacktiv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/synacktiv?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the swisslog-healthcare index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Swisslog Healthcare CVE Disclosures ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/swisslog-healthcare?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/swisslog-healthcare?cursor=` :param page: set the page number of the response :type page: int @@ -276763,7 +276763,7 @@ async def index_synacktiv_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_synacktiv_get_serialize( + _param = self._index_swisslog_healthcare_get_serialize( page=page, limit=limit, cursor=cursor, @@ -276795,7 +276795,7 @@ async def index_synacktiv_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -276811,7 +276811,7 @@ async def index_synacktiv_get( @validate_call - async def index_synacktiv_get_with_http_info( + async def index_swisslog_healthcare_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -276849,10 +276849,10 @@ async def index_synacktiv_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination]: - """Return vulnerability data stored in index \"synacktiv\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"swisslog-healthcare\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the synacktiv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Synacktiv Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/synacktiv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/synacktiv?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the swisslog-healthcare index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Swisslog Healthcare CVE Disclosures ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/swisslog-healthcare?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/swisslog-healthcare?cursor=` :param page: set the page number of the response :type page: int @@ -276924,7 +276924,7 @@ async def index_synacktiv_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_synacktiv_get_serialize( + _param = self._index_swisslog_healthcare_get_serialize( page=page, limit=limit, cursor=cursor, @@ -276956,7 +276956,7 @@ async def index_synacktiv_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -276972,7 +276972,7 @@ async def index_synacktiv_get_with_http_info( @validate_call - async def index_synacktiv_get_without_preload_content( + async def index_swisslog_healthcare_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -277011,9 +277011,9 @@ async def index_synacktiv_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"synacktiv\" + """Return vulnerability data stored in index \"swisslog-healthcare\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the synacktiv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Synacktiv Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/synacktiv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/synacktiv?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the swisslog-healthcare index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Swisslog Healthcare CVE Disclosures ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/swisslog-healthcare?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/swisslog-healthcare?cursor=` :param page: set the page number of the response :type page: int @@ -277085,7 +277085,7 @@ async def index_synacktiv_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_synacktiv_get_serialize( + _param = self._index_swisslog_healthcare_get_serialize( page=page, limit=limit, cursor=cursor, @@ -277117,7 +277117,7 @@ async def index_synacktiv_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -277128,7 +277128,7 @@ async def index_synacktiv_get_without_preload_content( return response_data.response - def _index_synacktiv_get_serialize( + def _index_swisslog_healthcare_get_serialize( self, page, limit, @@ -277296,7 +277296,7 @@ def _index_synacktiv_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/synacktiv', + resource_path='/v3/index/swisslog-healthcare', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -277313,7 +277313,7 @@ def _index_synacktiv_get_serialize( @validate_call - async def index_syncrosoft_get( + async def index_symfony_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -277351,10 +277351,10 @@ async def index_syncrosoft_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination: - """Return vulnerability data stored in index \"syncrosoft\" + ) -> RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination: + """Return vulnerability data stored in index \"symfony\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the syncrosoft index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SyncroSoft Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/syncrosoft?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/syncrosoft?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the symfony index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Symfony Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/symfony?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/symfony?cursor=` :param page: set the page number of the response :type page: int @@ -277426,7 +277426,7 @@ async def index_syncrosoft_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_syncrosoft_get_serialize( + _param = self._index_symfony_get_serialize( page=page, limit=limit, cursor=cursor, @@ -277458,7 +277458,7 @@ async def index_syncrosoft_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination", '404': "str", '500': "str", } @@ -277474,7 +277474,7 @@ async def index_syncrosoft_get( @validate_call - async def index_syncrosoft_get_with_http_info( + async def index_symfony_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -277512,10 +277512,10 @@ async def index_syncrosoft_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination]: - """Return vulnerability data stored in index \"syncrosoft\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination]: + """Return vulnerability data stored in index \"symfony\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the syncrosoft index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SyncroSoft Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/syncrosoft?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/syncrosoft?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the symfony index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Symfony Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/symfony?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/symfony?cursor=` :param page: set the page number of the response :type page: int @@ -277587,7 +277587,7 @@ async def index_syncrosoft_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_syncrosoft_get_serialize( + _param = self._index_symfony_get_serialize( page=page, limit=limit, cursor=cursor, @@ -277619,7 +277619,7 @@ async def index_syncrosoft_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination", '404': "str", '500': "str", } @@ -277635,7 +277635,7 @@ async def index_syncrosoft_get_with_http_info( @validate_call - async def index_syncrosoft_get_without_preload_content( + async def index_symfony_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -277674,9 +277674,9 @@ async def index_syncrosoft_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"syncrosoft\" + """Return vulnerability data stored in index \"symfony\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the syncrosoft index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SyncroSoft Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/syncrosoft?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/syncrosoft?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the symfony index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Symfony Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/symfony?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/symfony?cursor=` :param page: set the page number of the response :type page: int @@ -277748,7 +277748,7 @@ async def index_syncrosoft_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_syncrosoft_get_serialize( + _param = self._index_symfony_get_serialize( page=page, limit=limit, cursor=cursor, @@ -277780,7 +277780,7 @@ async def index_syncrosoft_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination", '404': "str", '500': "str", } @@ -277791,7 +277791,7 @@ async def index_syncrosoft_get_without_preload_content( return response_data.response - def _index_syncrosoft_get_serialize( + def _index_symfony_get_serialize( self, page, limit, @@ -277959,7 +277959,7 @@ def _index_syncrosoft_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/syncrosoft', + resource_path='/v3/index/symfony', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -277976,7 +277976,7 @@ def _index_syncrosoft_get_serialize( @validate_call - async def index_synology_get( + async def index_synacktiv_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -278014,10 +278014,10 @@ async def index_synology_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination: - """Return vulnerability data stored in index \"synology\" + ) -> RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination: + """Return vulnerability data stored in index \"synacktiv\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the synology index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Synology Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/synology?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/synology?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the synacktiv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Synacktiv Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/synacktiv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/synacktiv?cursor=` :param page: set the page number of the response :type page: int @@ -278089,7 +278089,7 @@ async def index_synology_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_synology_get_serialize( + _param = self._index_synacktiv_get_serialize( page=page, limit=limit, cursor=cursor, @@ -278121,7 +278121,7 @@ async def index_synology_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination", '404': "str", '500': "str", } @@ -278137,7 +278137,7 @@ async def index_synology_get( @validate_call - async def index_synology_get_with_http_info( + async def index_synacktiv_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -278175,10 +278175,10 @@ async def index_synology_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination]: - """Return vulnerability data stored in index \"synology\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination]: + """Return vulnerability data stored in index \"synacktiv\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the synology index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Synology Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/synology?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/synology?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the synacktiv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Synacktiv Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/synacktiv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/synacktiv?cursor=` :param page: set the page number of the response :type page: int @@ -278250,7 +278250,7 @@ async def index_synology_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_synology_get_serialize( + _param = self._index_synacktiv_get_serialize( page=page, limit=limit, cursor=cursor, @@ -278282,7 +278282,7 @@ async def index_synology_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination", '404': "str", '500': "str", } @@ -278298,7 +278298,7 @@ async def index_synology_get_with_http_info( @validate_call - async def index_synology_get_without_preload_content( + async def index_synacktiv_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -278337,9 +278337,9 @@ async def index_synology_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"synology\" + """Return vulnerability data stored in index \"synacktiv\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the synology index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Synology Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/synology?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/synology?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the synacktiv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Synacktiv Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/synacktiv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/synacktiv?cursor=` :param page: set the page number of the response :type page: int @@ -278411,7 +278411,7 @@ async def index_synology_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_synology_get_serialize( + _param = self._index_synacktiv_get_serialize( page=page, limit=limit, cursor=cursor, @@ -278443,7 +278443,7 @@ async def index_synology_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination", '404': "str", '500': "str", } @@ -278454,7 +278454,7 @@ async def index_synology_get_without_preload_content( return response_data.response - def _index_synology_get_serialize( + def _index_synacktiv_get_serialize( self, page, limit, @@ -278622,7 +278622,7 @@ def _index_synology_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/synology', + resource_path='/v3/index/synacktiv', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -278639,7 +278639,7 @@ def _index_synology_get_serialize( @validate_call - async def index_syss_get( + async def index_syncrosoft_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -278677,10 +278677,10 @@ async def index_syss_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination: - """Return vulnerability data stored in index \"syss\" + ) -> RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination: + """Return vulnerability data stored in index \"syncrosoft\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the syss index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Syss Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/syss?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/syss?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the syncrosoft index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SyncroSoft Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/syncrosoft?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/syncrosoft?cursor=` :param page: set the page number of the response :type page: int @@ -278752,7 +278752,7 @@ async def index_syss_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_syss_get_serialize( + _param = self._index_syncrosoft_get_serialize( page=page, limit=limit, cursor=cursor, @@ -278784,7 +278784,7 @@ async def index_syss_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination", '404': "str", '500': "str", } @@ -278800,7 +278800,7 @@ async def index_syss_get( @validate_call - async def index_syss_get_with_http_info( + async def index_syncrosoft_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -278838,10 +278838,10 @@ async def index_syss_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination]: - """Return vulnerability data stored in index \"syss\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination]: + """Return vulnerability data stored in index \"syncrosoft\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the syss index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Syss Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/syss?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/syss?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the syncrosoft index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SyncroSoft Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/syncrosoft?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/syncrosoft?cursor=` :param page: set the page number of the response :type page: int @@ -278913,7 +278913,7 @@ async def index_syss_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_syss_get_serialize( + _param = self._index_syncrosoft_get_serialize( page=page, limit=limit, cursor=cursor, @@ -278945,7 +278945,7 @@ async def index_syss_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination", '404': "str", '500': "str", } @@ -278961,7 +278961,7 @@ async def index_syss_get_with_http_info( @validate_call - async def index_syss_get_without_preload_content( + async def index_syncrosoft_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -279000,9 +279000,9 @@ async def index_syss_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"syss\" + """Return vulnerability data stored in index \"syncrosoft\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the syss index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Syss Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/syss?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/syss?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the syncrosoft index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SyncroSoft Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/syncrosoft?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/syncrosoft?cursor=` :param page: set the page number of the response :type page: int @@ -279074,7 +279074,7 @@ async def index_syss_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_syss_get_serialize( + _param = self._index_syncrosoft_get_serialize( page=page, limit=limit, cursor=cursor, @@ -279106,7 +279106,7 @@ async def index_syss_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination", '404': "str", '500': "str", } @@ -279117,7 +279117,7 @@ async def index_syss_get_without_preload_content( return response_data.response - def _index_syss_get_serialize( + def _index_syncrosoft_get_serialize( self, page, limit, @@ -279285,7 +279285,7 @@ def _index_syss_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/syss', + resource_path='/v3/index/syncrosoft', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -279302,7 +279302,7 @@ def _index_syss_get_serialize( @validate_call - async def index_tailscale_get( + async def index_synology_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -279340,10 +279340,10 @@ async def index_tailscale_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination: - """Return vulnerability data stored in index \"tailscale\" + ) -> RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination: + """Return vulnerability data stored in index \"synology\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tailscale index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tailscale Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tailscale?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tailscale?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the synology index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Synology Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/synology?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/synology?cursor=` :param page: set the page number of the response :type page: int @@ -279415,7 +279415,7 @@ async def index_tailscale_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tailscale_get_serialize( + _param = self._index_synology_get_serialize( page=page, limit=limit, cursor=cursor, @@ -279447,7 +279447,7 @@ async def index_tailscale_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination", '404': "str", '500': "str", } @@ -279463,7 +279463,7 @@ async def index_tailscale_get( @validate_call - async def index_tailscale_get_with_http_info( + async def index_synology_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -279501,10 +279501,10 @@ async def index_tailscale_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination]: - """Return vulnerability data stored in index \"tailscale\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination]: + """Return vulnerability data stored in index \"synology\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tailscale index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tailscale Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tailscale?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tailscale?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the synology index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Synology Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/synology?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/synology?cursor=` :param page: set the page number of the response :type page: int @@ -279576,7 +279576,7 @@ async def index_tailscale_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tailscale_get_serialize( + _param = self._index_synology_get_serialize( page=page, limit=limit, cursor=cursor, @@ -279608,7 +279608,7 @@ async def index_tailscale_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination", '404': "str", '500': "str", } @@ -279624,7 +279624,7 @@ async def index_tailscale_get_with_http_info( @validate_call - async def index_tailscale_get_without_preload_content( + async def index_synology_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -279663,9 +279663,9 @@ async def index_tailscale_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"tailscale\" + """Return vulnerability data stored in index \"synology\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tailscale index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tailscale Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tailscale?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tailscale?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the synology index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Synology Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/synology?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/synology?cursor=` :param page: set the page number of the response :type page: int @@ -279737,7 +279737,7 @@ async def index_tailscale_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tailscale_get_serialize( + _param = self._index_synology_get_serialize( page=page, limit=limit, cursor=cursor, @@ -279769,7 +279769,7 @@ async def index_tailscale_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination", '404': "str", '500': "str", } @@ -279780,7 +279780,7 @@ async def index_tailscale_get_without_preload_content( return response_data.response - def _index_tailscale_get_serialize( + def _index_synology_get_serialize( self, page, limit, @@ -279948,7 +279948,7 @@ def _index_tailscale_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/tailscale', + resource_path='/v3/index/synology', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -279965,7 +279965,7 @@ def _index_tailscale_get_serialize( @validate_call - async def index_teamviewer_get( + async def index_syss_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -280003,10 +280003,10 @@ async def index_teamviewer_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination: - """Return vulnerability data stored in index \"teamviewer\" + ) -> RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination: + """Return vulnerability data stored in index \"syss\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the teamviewer index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TeamViewer Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/teamviewer?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/teamviewer?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the syss index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Syss Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/syss?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/syss?cursor=` :param page: set the page number of the response :type page: int @@ -280078,7 +280078,7 @@ async def index_teamviewer_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_teamviewer_get_serialize( + _param = self._index_syss_get_serialize( page=page, limit=limit, cursor=cursor, @@ -280110,7 +280110,7 @@ async def index_teamviewer_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination", '404': "str", '500': "str", } @@ -280126,7 +280126,7 @@ async def index_teamviewer_get( @validate_call - async def index_teamviewer_get_with_http_info( + async def index_syss_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -280164,10 +280164,10 @@ async def index_teamviewer_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination]: - """Return vulnerability data stored in index \"teamviewer\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination]: + """Return vulnerability data stored in index \"syss\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the teamviewer index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TeamViewer Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/teamviewer?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/teamviewer?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the syss index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Syss Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/syss?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/syss?cursor=` :param page: set the page number of the response :type page: int @@ -280239,7 +280239,7 @@ async def index_teamviewer_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_teamviewer_get_serialize( + _param = self._index_syss_get_serialize( page=page, limit=limit, cursor=cursor, @@ -280271,7 +280271,7 @@ async def index_teamviewer_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination", '404': "str", '500': "str", } @@ -280287,7 +280287,7 @@ async def index_teamviewer_get_with_http_info( @validate_call - async def index_teamviewer_get_without_preload_content( + async def index_syss_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -280326,9 +280326,9 @@ async def index_teamviewer_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"teamviewer\" + """Return vulnerability data stored in index \"syss\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the teamviewer index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TeamViewer Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/teamviewer?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/teamviewer?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the syss index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Syss Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/syss?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/syss?cursor=` :param page: set the page number of the response :type page: int @@ -280400,7 +280400,7 @@ async def index_teamviewer_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_teamviewer_get_serialize( + _param = self._index_syss_get_serialize( page=page, limit=limit, cursor=cursor, @@ -280432,7 +280432,7 @@ async def index_teamviewer_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination", '404': "str", '500': "str", } @@ -280443,7 +280443,7 @@ async def index_teamviewer_get_without_preload_content( return response_data.response - def _index_teamviewer_get_serialize( + def _index_syss_get_serialize( self, page, limit, @@ -280611,7 +280611,7 @@ def _index_teamviewer_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/teamviewer', + resource_path='/v3/index/syss', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -280628,7 +280628,7 @@ def _index_teamviewer_get_serialize( @validate_call - async def index_tenable_research_advisories_get( + async def index_tailscale_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -280666,10 +280666,10 @@ async def index_tenable_research_advisories_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"tenable-research-advisories\" + ) -> RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination: + """Return vulnerability data stored in index \"tailscale\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tenable-research-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tenable Research Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tenable-research-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tenable-research-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tailscale index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tailscale Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tailscale?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tailscale?cursor=` :param page: set the page number of the response :type page: int @@ -280741,7 +280741,7 @@ async def index_tenable_research_advisories_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tenable_research_advisories_get_serialize( + _param = self._index_tailscale_get_serialize( page=page, limit=limit, cursor=cursor, @@ -280773,7 +280773,7 @@ async def index_tenable_research_advisories_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination", '404': "str", '500': "str", } @@ -280789,7 +280789,7 @@ async def index_tenable_research_advisories_get( @validate_call - async def index_tenable_research_advisories_get_with_http_info( + async def index_tailscale_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -280827,10 +280827,10 @@ async def index_tenable_research_advisories_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"tenable-research-advisories\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination]: + """Return vulnerability data stored in index \"tailscale\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tenable-research-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tenable Research Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tenable-research-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tenable-research-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tailscale index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tailscale Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tailscale?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tailscale?cursor=` :param page: set the page number of the response :type page: int @@ -280902,7 +280902,7 @@ async def index_tenable_research_advisories_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tenable_research_advisories_get_serialize( + _param = self._index_tailscale_get_serialize( page=page, limit=limit, cursor=cursor, @@ -280934,7 +280934,7 @@ async def index_tenable_research_advisories_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination", '404': "str", '500': "str", } @@ -280950,7 +280950,7 @@ async def index_tenable_research_advisories_get_with_http_info( @validate_call - async def index_tenable_research_advisories_get_without_preload_content( + async def index_tailscale_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -280989,9 +280989,9 @@ async def index_tenable_research_advisories_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"tenable-research-advisories\" + """Return vulnerability data stored in index \"tailscale\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tenable-research-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tenable Research Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tenable-research-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tenable-research-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tailscale index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tailscale Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tailscale?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tailscale?cursor=` :param page: set the page number of the response :type page: int @@ -281063,7 +281063,7 @@ async def index_tenable_research_advisories_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tenable_research_advisories_get_serialize( + _param = self._index_tailscale_get_serialize( page=page, limit=limit, cursor=cursor, @@ -281095,7 +281095,7 @@ async def index_tenable_research_advisories_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination", '404': "str", '500': "str", } @@ -281106,7 +281106,7 @@ async def index_tenable_research_advisories_get_without_preload_content( return response_data.response - def _index_tenable_research_advisories_get_serialize( + def _index_tailscale_get_serialize( self, page, limit, @@ -281274,7 +281274,7 @@ def _index_tenable_research_advisories_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/tenable-research-advisories', + resource_path='/v3/index/tailscale', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -281291,7 +281291,7 @@ def _index_tenable_research_advisories_get_serialize( @validate_call - async def index_tencent_get( + async def index_teamviewer_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -281329,10 +281329,10 @@ async def index_tencent_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination: - """Return vulnerability data stored in index \"tencent\" + ) -> RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination: + """Return vulnerability data stored in index \"teamviewer\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tencent index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tencent Vulnerability Risk Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tencent?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tencent?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the teamviewer index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TeamViewer Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/teamviewer?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/teamviewer?cursor=` :param page: set the page number of the response :type page: int @@ -281404,7 +281404,7 @@ async def index_tencent_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tencent_get_serialize( + _param = self._index_teamviewer_get_serialize( page=page, limit=limit, cursor=cursor, @@ -281436,7 +281436,7 @@ async def index_tencent_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination", '404': "str", '500': "str", } @@ -281452,7 +281452,7 @@ async def index_tencent_get( @validate_call - async def index_tencent_get_with_http_info( + async def index_teamviewer_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -281490,10 +281490,10 @@ async def index_tencent_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination]: - """Return vulnerability data stored in index \"tencent\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination]: + """Return vulnerability data stored in index \"teamviewer\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tencent index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tencent Vulnerability Risk Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tencent?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tencent?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the teamviewer index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TeamViewer Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/teamviewer?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/teamviewer?cursor=` :param page: set the page number of the response :type page: int @@ -281565,7 +281565,7 @@ async def index_tencent_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tencent_get_serialize( + _param = self._index_teamviewer_get_serialize( page=page, limit=limit, cursor=cursor, @@ -281597,7 +281597,7 @@ async def index_tencent_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination", '404': "str", '500': "str", } @@ -281613,7 +281613,7 @@ async def index_tencent_get_with_http_info( @validate_call - async def index_tencent_get_without_preload_content( + async def index_teamviewer_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -281652,9 +281652,9 @@ async def index_tencent_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"tencent\" + """Return vulnerability data stored in index \"teamviewer\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tencent index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tencent Vulnerability Risk Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tencent?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tencent?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the teamviewer index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TeamViewer Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/teamviewer?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/teamviewer?cursor=` :param page: set the page number of the response :type page: int @@ -281726,7 +281726,7 @@ async def index_tencent_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tencent_get_serialize( + _param = self._index_teamviewer_get_serialize( page=page, limit=limit, cursor=cursor, @@ -281758,7 +281758,7 @@ async def index_tencent_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination", '404': "str", '500': "str", } @@ -281769,7 +281769,7 @@ async def index_tencent_get_without_preload_content( return response_data.response - def _index_tencent_get_serialize( + def _index_teamviewer_get_serialize( self, page, limit, @@ -281937,7 +281937,7 @@ def _index_tencent_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/tencent', + resource_path='/v3/index/teamviewer', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -281954,7 +281954,7 @@ def _index_tencent_get_serialize( @validate_call - async def index_thales_get( + async def index_tenable_research_advisories_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -281992,10 +281992,10 @@ async def index_thales_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination: - """Return vulnerability data stored in index \"thales\" + ) -> RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"tenable-research-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the thales index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Thales Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/thales?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/thales?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tenable-research-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tenable Research Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tenable-research-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tenable-research-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -282067,7 +282067,7 @@ async def index_thales_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_thales_get_serialize( + _param = self._index_tenable_research_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -282099,7 +282099,7 @@ async def index_thales_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -282115,7 +282115,7 @@ async def index_thales_get( @validate_call - async def index_thales_get_with_http_info( + async def index_tenable_research_advisories_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -282153,10 +282153,10 @@ async def index_thales_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination]: - """Return vulnerability data stored in index \"thales\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"tenable-research-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the thales index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Thales Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/thales?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/thales?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tenable-research-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tenable Research Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tenable-research-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tenable-research-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -282228,7 +282228,7 @@ async def index_thales_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_thales_get_serialize( + _param = self._index_tenable_research_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -282260,7 +282260,7 @@ async def index_thales_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -282276,7 +282276,7 @@ async def index_thales_get_with_http_info( @validate_call - async def index_thales_get_without_preload_content( + async def index_tenable_research_advisories_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -282315,9 +282315,9 @@ async def index_thales_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"thales\" + """Return vulnerability data stored in index \"tenable-research-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the thales index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Thales Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/thales?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/thales?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tenable-research-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tenable Research Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tenable-research-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tenable-research-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -282389,7 +282389,7 @@ async def index_thales_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_thales_get_serialize( + _param = self._index_tenable_research_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -282421,7 +282421,7 @@ async def index_thales_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -282432,7 +282432,7 @@ async def index_thales_get_without_preload_content( return response_data.response - def _index_thales_get_serialize( + def _index_tenable_research_advisories_get_serialize( self, page, limit, @@ -282600,7 +282600,7 @@ def _index_thales_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/thales', + resource_path='/v3/index/tenable-research-advisories', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -282617,7 +282617,7 @@ def _index_thales_get_serialize( @validate_call - async def index_themissinglink_get( + async def index_tencent_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -282655,10 +282655,10 @@ async def index_themissinglink_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination: - """Return vulnerability data stored in index \"themissinglink\" + ) -> RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination: + """Return vulnerability data stored in index \"tencent\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the themissinglink index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** the missing link Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/themissinglink?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/themissinglink?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tencent index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tencent Vulnerability Risk Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tencent?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tencent?cursor=` :param page: set the page number of the response :type page: int @@ -282730,7 +282730,7 @@ async def index_themissinglink_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_themissinglink_get_serialize( + _param = self._index_tencent_get_serialize( page=page, limit=limit, cursor=cursor, @@ -282762,7 +282762,7 @@ async def index_themissinglink_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination", '404': "str", '500': "str", } @@ -282778,7 +282778,7 @@ async def index_themissinglink_get( @validate_call - async def index_themissinglink_get_with_http_info( + async def index_tencent_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -282816,10 +282816,10 @@ async def index_themissinglink_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination]: - """Return vulnerability data stored in index \"themissinglink\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination]: + """Return vulnerability data stored in index \"tencent\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the themissinglink index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** the missing link Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/themissinglink?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/themissinglink?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tencent index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tencent Vulnerability Risk Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tencent?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tencent?cursor=` :param page: set the page number of the response :type page: int @@ -282891,7 +282891,7 @@ async def index_themissinglink_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_themissinglink_get_serialize( + _param = self._index_tencent_get_serialize( page=page, limit=limit, cursor=cursor, @@ -282923,7 +282923,7 @@ async def index_themissinglink_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination", '404': "str", '500': "str", } @@ -282939,7 +282939,7 @@ async def index_themissinglink_get_with_http_info( @validate_call - async def index_themissinglink_get_without_preload_content( + async def index_tencent_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -282978,9 +282978,9 @@ async def index_themissinglink_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"themissinglink\" + """Return vulnerability data stored in index \"tencent\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the themissinglink index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** the missing link Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/themissinglink?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/themissinglink?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tencent index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tencent Vulnerability Risk Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tencent?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tencent?cursor=` :param page: set the page number of the response :type page: int @@ -283052,7 +283052,7 @@ async def index_themissinglink_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_themissinglink_get_serialize( + _param = self._index_tencent_get_serialize( page=page, limit=limit, cursor=cursor, @@ -283084,7 +283084,7 @@ async def index_themissinglink_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination", '404': "str", '500': "str", } @@ -283095,7 +283095,7 @@ async def index_themissinglink_get_without_preload_content( return response_data.response - def _index_themissinglink_get_serialize( + def _index_tencent_get_serialize( self, page, limit, @@ -283263,7 +283263,7 @@ def _index_themissinglink_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/themissinglink', + resource_path='/v3/index/tencent', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -283280,7 +283280,7 @@ def _index_themissinglink_get_serialize( @validate_call - async def index_thermo_fisher_get( + async def index_thales_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -283318,10 +283318,10 @@ async def index_thermo_fisher_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination: - """Return vulnerability data stored in index \"thermo-fisher\" + ) -> RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination: + """Return vulnerability data stored in index \"thales\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the thermo-fisher index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Thermo Fisher Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/thermo-fisher?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/thermo-fisher?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the thales index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Thales Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/thales?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/thales?cursor=` :param page: set the page number of the response :type page: int @@ -283393,7 +283393,7 @@ async def index_thermo_fisher_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_thermo_fisher_get_serialize( + _param = self._index_thales_get_serialize( page=page, limit=limit, cursor=cursor, @@ -283425,7 +283425,7 @@ async def index_thermo_fisher_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination", '404': "str", '500': "str", } @@ -283441,7 +283441,7 @@ async def index_thermo_fisher_get( @validate_call - async def index_thermo_fisher_get_with_http_info( + async def index_thales_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -283479,10 +283479,10 @@ async def index_thermo_fisher_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination]: - """Return vulnerability data stored in index \"thermo-fisher\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination]: + """Return vulnerability data stored in index \"thales\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the thermo-fisher index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Thermo Fisher Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/thermo-fisher?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/thermo-fisher?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the thales index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Thales Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/thales?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/thales?cursor=` :param page: set the page number of the response :type page: int @@ -283554,7 +283554,7 @@ async def index_thermo_fisher_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_thermo_fisher_get_serialize( + _param = self._index_thales_get_serialize( page=page, limit=limit, cursor=cursor, @@ -283586,7 +283586,7 @@ async def index_thermo_fisher_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination", '404': "str", '500': "str", } @@ -283602,7 +283602,7 @@ async def index_thermo_fisher_get_with_http_info( @validate_call - async def index_thermo_fisher_get_without_preload_content( + async def index_thales_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -283641,9 +283641,9 @@ async def index_thermo_fisher_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"thermo-fisher\" + """Return vulnerability data stored in index \"thales\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the thermo-fisher index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Thermo Fisher Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/thermo-fisher?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/thermo-fisher?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the thales index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Thales Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/thales?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/thales?cursor=` :param page: set the page number of the response :type page: int @@ -283715,7 +283715,7 @@ async def index_thermo_fisher_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_thermo_fisher_get_serialize( + _param = self._index_thales_get_serialize( page=page, limit=limit, cursor=cursor, @@ -283747,7 +283747,7 @@ async def index_thermo_fisher_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination", '404': "str", '500': "str", } @@ -283758,7 +283758,7 @@ async def index_thermo_fisher_get_without_preload_content( return response_data.response - def _index_thermo_fisher_get_serialize( + def _index_thales_get_serialize( self, page, limit, @@ -283926,7 +283926,7 @@ def _index_thermo_fisher_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/thermo-fisher', + resource_path='/v3/index/thales', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -283943,7 +283943,7 @@ def _index_thermo_fisher_get_serialize( @validate_call - async def index_threat_actors_get( + async def index_themissinglink_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -283981,10 +283981,10 @@ async def index_threat_actors_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination: - """Return vulnerability data stored in index \"threat-actors\" + ) -> RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination: + """Return vulnerability data stored in index \"themissinglink\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the threat-actors index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Threat Actors Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/threat-actors?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/threat-actors?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the themissinglink index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** the missing link Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/themissinglink?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/themissinglink?cursor=` :param page: set the page number of the response :type page: int @@ -284056,7 +284056,7 @@ async def index_threat_actors_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_threat_actors_get_serialize( + _param = self._index_themissinglink_get_serialize( page=page, limit=limit, cursor=cursor, @@ -284088,7 +284088,7 @@ async def index_threat_actors_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination", '404': "str", '500': "str", } @@ -284104,7 +284104,7 @@ async def index_threat_actors_get( @validate_call - async def index_threat_actors_get_with_http_info( + async def index_themissinglink_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -284142,10 +284142,10 @@ async def index_threat_actors_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination]: - """Return vulnerability data stored in index \"threat-actors\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination]: + """Return vulnerability data stored in index \"themissinglink\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the threat-actors index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Threat Actors Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/threat-actors?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/threat-actors?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the themissinglink index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** the missing link Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/themissinglink?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/themissinglink?cursor=` :param page: set the page number of the response :type page: int @@ -284217,7 +284217,7 @@ async def index_threat_actors_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_threat_actors_get_serialize( + _param = self._index_themissinglink_get_serialize( page=page, limit=limit, cursor=cursor, @@ -284249,7 +284249,7 @@ async def index_threat_actors_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination", '404': "str", '500': "str", } @@ -284265,7 +284265,7 @@ async def index_threat_actors_get_with_http_info( @validate_call - async def index_threat_actors_get_without_preload_content( + async def index_themissinglink_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -284304,9 +284304,9 @@ async def index_threat_actors_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"threat-actors\" + """Return vulnerability data stored in index \"themissinglink\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the threat-actors index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Threat Actors Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/threat-actors?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/threat-actors?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the themissinglink index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** the missing link Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/themissinglink?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/themissinglink?cursor=` :param page: set the page number of the response :type page: int @@ -284378,7 +284378,7 @@ async def index_threat_actors_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_threat_actors_get_serialize( + _param = self._index_themissinglink_get_serialize( page=page, limit=limit, cursor=cursor, @@ -284410,7 +284410,7 @@ async def index_threat_actors_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination", '404': "str", '500': "str", } @@ -284421,7 +284421,7 @@ async def index_threat_actors_get_without_preload_content( return response_data.response - def _index_threat_actors_get_serialize( + def _index_themissinglink_get_serialize( self, page, limit, @@ -284589,7 +284589,7 @@ def _index_threat_actors_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/threat-actors', + resource_path='/v3/index/themissinglink', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -284606,7 +284606,7 @@ def _index_threat_actors_get_serialize( @validate_call - async def index_ti_get( + async def index_thermo_fisher_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -284644,10 +284644,10 @@ async def index_ti_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination: - """Return vulnerability data stored in index \"ti\" + ) -> RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination: + """Return vulnerability data stored in index \"thermo-fisher\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Texas Instruments Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ti?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the thermo-fisher index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Thermo Fisher Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/thermo-fisher?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/thermo-fisher?cursor=` :param page: set the page number of the response :type page: int @@ -284719,7 +284719,7 @@ async def index_ti_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ti_get_serialize( + _param = self._index_thermo_fisher_get_serialize( page=page, limit=limit, cursor=cursor, @@ -284751,7 +284751,7 @@ async def index_ti_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination", '404': "str", '500': "str", } @@ -284767,7 +284767,7 @@ async def index_ti_get( @validate_call - async def index_ti_get_with_http_info( + async def index_thermo_fisher_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -284805,10 +284805,10 @@ async def index_ti_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination]: - """Return vulnerability data stored in index \"ti\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination]: + """Return vulnerability data stored in index \"thermo-fisher\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Texas Instruments Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ti?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the thermo-fisher index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Thermo Fisher Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/thermo-fisher?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/thermo-fisher?cursor=` :param page: set the page number of the response :type page: int @@ -284880,7 +284880,7 @@ async def index_ti_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ti_get_serialize( + _param = self._index_thermo_fisher_get_serialize( page=page, limit=limit, cursor=cursor, @@ -284912,7 +284912,7 @@ async def index_ti_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination", '404': "str", '500': "str", } @@ -284928,7 +284928,7 @@ async def index_ti_get_with_http_info( @validate_call - async def index_ti_get_without_preload_content( + async def index_thermo_fisher_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -284967,9 +284967,9 @@ async def index_ti_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ti\" + """Return vulnerability data stored in index \"thermo-fisher\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Texas Instruments Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ti?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the thermo-fisher index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Thermo Fisher Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/thermo-fisher?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/thermo-fisher?cursor=` :param page: set the page number of the response :type page: int @@ -285041,7 +285041,7 @@ async def index_ti_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ti_get_serialize( + _param = self._index_thermo_fisher_get_serialize( page=page, limit=limit, cursor=cursor, @@ -285073,7 +285073,7 @@ async def index_ti_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination", '404': "str", '500': "str", } @@ -285084,7 +285084,7 @@ async def index_ti_get_without_preload_content( return response_data.response - def _index_ti_get_serialize( + def _index_thermo_fisher_get_serialize( self, page, limit, @@ -285252,7 +285252,7 @@ def _index_ti_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ti', + resource_path='/v3/index/thermo-fisher', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -285269,7 +285269,7 @@ def _index_ti_get_serialize( @validate_call - async def index_tibco_get( + async def index_threat_actors_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -285307,10 +285307,10 @@ async def index_tibco_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination: - """Return vulnerability data stored in index \"tibco\" + ) -> RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination: + """Return vulnerability data stored in index \"threat-actors\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tibco index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TIBCO Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tibco?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tibco?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the threat-actors index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Threat Actors Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/threat-actors?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/threat-actors?cursor=` :param page: set the page number of the response :type page: int @@ -285382,7 +285382,7 @@ async def index_tibco_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tibco_get_serialize( + _param = self._index_threat_actors_get_serialize( page=page, limit=limit, cursor=cursor, @@ -285414,7 +285414,7 @@ async def index_tibco_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination", '404': "str", '500': "str", } @@ -285430,7 +285430,7 @@ async def index_tibco_get( @validate_call - async def index_tibco_get_with_http_info( + async def index_threat_actors_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -285468,10 +285468,10 @@ async def index_tibco_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination]: - """Return vulnerability data stored in index \"tibco\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination]: + """Return vulnerability data stored in index \"threat-actors\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tibco index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TIBCO Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tibco?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tibco?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the threat-actors index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Threat Actors Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/threat-actors?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/threat-actors?cursor=` :param page: set the page number of the response :type page: int @@ -285543,7 +285543,7 @@ async def index_tibco_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tibco_get_serialize( + _param = self._index_threat_actors_get_serialize( page=page, limit=limit, cursor=cursor, @@ -285575,7 +285575,7 @@ async def index_tibco_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination", '404': "str", '500': "str", } @@ -285591,7 +285591,7 @@ async def index_tibco_get_with_http_info( @validate_call - async def index_tibco_get_without_preload_content( + async def index_threat_actors_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -285630,9 +285630,9 @@ async def index_tibco_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"tibco\" + """Return vulnerability data stored in index \"threat-actors\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tibco index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TIBCO Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tibco?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tibco?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the threat-actors index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Threat Actors Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/threat-actors?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/threat-actors?cursor=` :param page: set the page number of the response :type page: int @@ -285704,7 +285704,7 @@ async def index_tibco_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tibco_get_serialize( + _param = self._index_threat_actors_get_serialize( page=page, limit=limit, cursor=cursor, @@ -285736,7 +285736,7 @@ async def index_tibco_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination", '404': "str", '500': "str", } @@ -285747,7 +285747,7 @@ async def index_tibco_get_without_preload_content( return response_data.response - def _index_tibco_get_serialize( + def _index_threat_actors_get_serialize( self, page, limit, @@ -285915,7 +285915,7 @@ def _index_tibco_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/tibco', + resource_path='/v3/index/threat-actors', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -285932,7 +285932,7 @@ def _index_tibco_get_serialize( @validate_call - async def index_tp_link_get( + async def index_ti_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -285970,10 +285970,10 @@ async def index_tp_link_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination: - """Return vulnerability data stored in index \"tp-link\" + ) -> RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination: + """Return vulnerability data stored in index \"ti\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tp-link index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TP-Link Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tp-link?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tp-link?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Texas Instruments Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ti?cursor=` :param page: set the page number of the response :type page: int @@ -286045,7 +286045,7 @@ async def index_tp_link_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tp_link_get_serialize( + _param = self._index_ti_get_serialize( page=page, limit=limit, cursor=cursor, @@ -286077,7 +286077,7 @@ async def index_tp_link_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination", '404': "str", '500': "str", } @@ -286093,7 +286093,7 @@ async def index_tp_link_get( @validate_call - async def index_tp_link_get_with_http_info( + async def index_ti_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -286131,10 +286131,10 @@ async def index_tp_link_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination]: - """Return vulnerability data stored in index \"tp-link\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination]: + """Return vulnerability data stored in index \"ti\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tp-link index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TP-Link Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tp-link?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tp-link?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Texas Instruments Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ti?cursor=` :param page: set the page number of the response :type page: int @@ -286206,7 +286206,7 @@ async def index_tp_link_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tp_link_get_serialize( + _param = self._index_ti_get_serialize( page=page, limit=limit, cursor=cursor, @@ -286238,7 +286238,7 @@ async def index_tp_link_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination", '404': "str", '500': "str", } @@ -286254,7 +286254,7 @@ async def index_tp_link_get_with_http_info( @validate_call - async def index_tp_link_get_without_preload_content( + async def index_ti_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -286293,9 +286293,9 @@ async def index_tp_link_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"tp-link\" + """Return vulnerability data stored in index \"ti\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tp-link index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TP-Link Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tp-link?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tp-link?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Texas Instruments Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ti?cursor=` :param page: set the page number of the response :type page: int @@ -286367,7 +286367,7 @@ async def index_tp_link_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tp_link_get_serialize( + _param = self._index_ti_get_serialize( page=page, limit=limit, cursor=cursor, @@ -286399,7 +286399,7 @@ async def index_tp_link_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination", '404': "str", '500': "str", } @@ -286410,7 +286410,7 @@ async def index_tp_link_get_without_preload_content( return response_data.response - def _index_tp_link_get_serialize( + def _index_ti_get_serialize( self, page, limit, @@ -286578,7 +286578,7 @@ def _index_tp_link_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/tp-link', + resource_path='/v3/index/ti', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -286595,7 +286595,7 @@ def _index_tp_link_get_serialize( @validate_call - async def index_trane_technology_get( + async def index_tibco_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -286633,10 +286633,10 @@ async def index_trane_technology_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination: - """Return vulnerability data stored in index \"trane-technology\" + ) -> RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination: + """Return vulnerability data stored in index \"tibco\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trane-technology index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trane Technology Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trane-technology?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trane-technology?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tibco index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TIBCO Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tibco?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tibco?cursor=` :param page: set the page number of the response :type page: int @@ -286708,7 +286708,7 @@ async def index_trane_technology_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_trane_technology_get_serialize( + _param = self._index_tibco_get_serialize( page=page, limit=limit, cursor=cursor, @@ -286740,7 +286740,7 @@ async def index_trane_technology_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination", '404': "str", '500': "str", } @@ -286756,7 +286756,7 @@ async def index_trane_technology_get( @validate_call - async def index_trane_technology_get_with_http_info( + async def index_tibco_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -286794,10 +286794,10 @@ async def index_trane_technology_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination]: - """Return vulnerability data stored in index \"trane-technology\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination]: + """Return vulnerability data stored in index \"tibco\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trane-technology index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trane Technology Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trane-technology?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trane-technology?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tibco index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TIBCO Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tibco?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tibco?cursor=` :param page: set the page number of the response :type page: int @@ -286869,7 +286869,7 @@ async def index_trane_technology_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_trane_technology_get_serialize( + _param = self._index_tibco_get_serialize( page=page, limit=limit, cursor=cursor, @@ -286901,7 +286901,7 @@ async def index_trane_technology_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination", '404': "str", '500': "str", } @@ -286917,7 +286917,7 @@ async def index_trane_technology_get_with_http_info( @validate_call - async def index_trane_technology_get_without_preload_content( + async def index_tibco_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -286956,9 +286956,9 @@ async def index_trane_technology_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"trane-technology\" + """Return vulnerability data stored in index \"tibco\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trane-technology index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trane Technology Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trane-technology?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trane-technology?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tibco index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TIBCO Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tibco?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tibco?cursor=` :param page: set the page number of the response :type page: int @@ -287030,7 +287030,7 @@ async def index_trane_technology_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_trane_technology_get_serialize( + _param = self._index_tibco_get_serialize( page=page, limit=limit, cursor=cursor, @@ -287062,7 +287062,7 @@ async def index_trane_technology_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination", '404': "str", '500': "str", } @@ -287073,7 +287073,7 @@ async def index_trane_technology_get_without_preload_content( return response_data.response - def _index_trane_technology_get_serialize( + def _index_tibco_get_serialize( self, page, limit, @@ -287241,7 +287241,7 @@ def _index_trane_technology_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/trane-technology', + resource_path='/v3/index/tibco', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -287258,7 +287258,7 @@ def _index_trane_technology_get_serialize( @validate_call - async def index_trendmicro_get( + async def index_tp_link_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -287296,10 +287296,10 @@ async def index_trendmicro_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination: - """Return vulnerability data stored in index \"trendmicro\" + ) -> RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination: + """Return vulnerability data stored in index \"tp-link\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trendmicro index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trend Micro Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trendmicro?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trendmicro?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tp-link index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TP-Link Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tp-link?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tp-link?cursor=` :param page: set the page number of the response :type page: int @@ -287371,7 +287371,7 @@ async def index_trendmicro_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_trendmicro_get_serialize( + _param = self._index_tp_link_get_serialize( page=page, limit=limit, cursor=cursor, @@ -287403,7 +287403,7 @@ async def index_trendmicro_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination", '404': "str", '500': "str", } @@ -287419,7 +287419,7 @@ async def index_trendmicro_get( @validate_call - async def index_trendmicro_get_with_http_info( + async def index_tp_link_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -287457,10 +287457,10 @@ async def index_trendmicro_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination]: - """Return vulnerability data stored in index \"trendmicro\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination]: + """Return vulnerability data stored in index \"tp-link\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trendmicro index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trend Micro Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trendmicro?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trendmicro?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tp-link index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TP-Link Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tp-link?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tp-link?cursor=` :param page: set the page number of the response :type page: int @@ -287532,7 +287532,7 @@ async def index_trendmicro_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_trendmicro_get_serialize( + _param = self._index_tp_link_get_serialize( page=page, limit=limit, cursor=cursor, @@ -287564,7 +287564,7 @@ async def index_trendmicro_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination", '404': "str", '500': "str", } @@ -287580,7 +287580,7 @@ async def index_trendmicro_get_with_http_info( @validate_call - async def index_trendmicro_get_without_preload_content( + async def index_tp_link_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -287619,9 +287619,9 @@ async def index_trendmicro_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"trendmicro\" + """Return vulnerability data stored in index \"tp-link\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trendmicro index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trend Micro Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trendmicro?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trendmicro?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tp-link index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TP-Link Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tp-link?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tp-link?cursor=` :param page: set the page number of the response :type page: int @@ -287693,7 +287693,7 @@ async def index_trendmicro_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_trendmicro_get_serialize( + _param = self._index_tp_link_get_serialize( page=page, limit=limit, cursor=cursor, @@ -287725,7 +287725,7 @@ async def index_trendmicro_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination", '404': "str", '500': "str", } @@ -287736,7 +287736,7 @@ async def index_trendmicro_get_without_preload_content( return response_data.response - def _index_trendmicro_get_serialize( + def _index_tp_link_get_serialize( self, page, limit, @@ -287904,7 +287904,7 @@ def _index_trendmicro_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/trendmicro', + resource_path='/v3/index/tp-link', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -287921,7 +287921,7 @@ def _index_trendmicro_get_serialize( @validate_call - async def index_trustwave_get( + async def index_trane_technology_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -287959,10 +287959,10 @@ async def index_trustwave_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination: - """Return vulnerability data stored in index \"trustwave\" + ) -> RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination: + """Return vulnerability data stored in index \"trane-technology\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trustwave index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trustwave Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trustwave?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trustwave?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trane-technology index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trane Technology Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trane-technology?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trane-technology?cursor=` :param page: set the page number of the response :type page: int @@ -288034,7 +288034,7 @@ async def index_trustwave_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_trustwave_get_serialize( + _param = self._index_trane_technology_get_serialize( page=page, limit=limit, cursor=cursor, @@ -288066,7 +288066,7 @@ async def index_trustwave_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination", '404': "str", '500': "str", } @@ -288082,7 +288082,7 @@ async def index_trustwave_get( @validate_call - async def index_trustwave_get_with_http_info( + async def index_trane_technology_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -288120,10 +288120,10 @@ async def index_trustwave_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination]: - """Return vulnerability data stored in index \"trustwave\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination]: + """Return vulnerability data stored in index \"trane-technology\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trustwave index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trustwave Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trustwave?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trustwave?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trane-technology index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trane Technology Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trane-technology?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trane-technology?cursor=` :param page: set the page number of the response :type page: int @@ -288195,7 +288195,7 @@ async def index_trustwave_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_trustwave_get_serialize( + _param = self._index_trane_technology_get_serialize( page=page, limit=limit, cursor=cursor, @@ -288227,7 +288227,7 @@ async def index_trustwave_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination", '404': "str", '500': "str", } @@ -288243,7 +288243,7 @@ async def index_trustwave_get_with_http_info( @validate_call - async def index_trustwave_get_without_preload_content( + async def index_trane_technology_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -288282,9 +288282,9 @@ async def index_trustwave_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"trustwave\" + """Return vulnerability data stored in index \"trane-technology\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trustwave index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trustwave Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trustwave?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trustwave?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trane-technology index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trane Technology Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trane-technology?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trane-technology?cursor=` :param page: set the page number of the response :type page: int @@ -288356,7 +288356,7 @@ async def index_trustwave_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_trustwave_get_serialize( + _param = self._index_trane_technology_get_serialize( page=page, limit=limit, cursor=cursor, @@ -288388,7 +288388,7 @@ async def index_trustwave_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination", '404': "str", '500': "str", } @@ -288399,7 +288399,7 @@ async def index_trustwave_get_without_preload_content( return response_data.response - def _index_trustwave_get_serialize( + def _index_trane_technology_get_serialize( self, page, limit, @@ -288567,7 +288567,7 @@ def _index_trustwave_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/trustwave', + resource_path='/v3/index/trane-technology', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -288584,7 +288584,7 @@ def _index_trustwave_get_serialize( @validate_call - async def index_twcert_get( + async def index_trendmicro_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -288622,10 +288622,10 @@ async def index_twcert_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"twcert\" + ) -> RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination: + """Return vulnerability data stored in index \"trendmicro\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the twcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Taiwan CERT Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/twcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/twcert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trendmicro index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trend Micro Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trendmicro?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trendmicro?cursor=` :param page: set the page number of the response :type page: int @@ -288697,7 +288697,7 @@ async def index_twcert_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_twcert_get_serialize( + _param = self._index_trendmicro_get_serialize( page=page, limit=limit, cursor=cursor, @@ -288729,7 +288729,7 @@ async def index_twcert_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination", '404': "str", '500': "str", } @@ -288745,7 +288745,7 @@ async def index_twcert_get( @validate_call - async def index_twcert_get_with_http_info( + async def index_trendmicro_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -288783,10 +288783,10 @@ async def index_twcert_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"twcert\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination]: + """Return vulnerability data stored in index \"trendmicro\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the twcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Taiwan CERT Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/twcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/twcert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trendmicro index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trend Micro Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trendmicro?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trendmicro?cursor=` :param page: set the page number of the response :type page: int @@ -288858,7 +288858,7 @@ async def index_twcert_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_twcert_get_serialize( + _param = self._index_trendmicro_get_serialize( page=page, limit=limit, cursor=cursor, @@ -288890,7 +288890,7 @@ async def index_twcert_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination", '404': "str", '500': "str", } @@ -288906,7 +288906,7 @@ async def index_twcert_get_with_http_info( @validate_call - async def index_twcert_get_without_preload_content( + async def index_trendmicro_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -288945,9 +288945,9 @@ async def index_twcert_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"twcert\" + """Return vulnerability data stored in index \"trendmicro\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the twcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Taiwan CERT Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/twcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/twcert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trendmicro index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trend Micro Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trendmicro?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trendmicro?cursor=` :param page: set the page number of the response :type page: int @@ -289019,7 +289019,7 @@ async def index_twcert_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_twcert_get_serialize( + _param = self._index_trendmicro_get_serialize( page=page, limit=limit, cursor=cursor, @@ -289051,7 +289051,7 @@ async def index_twcert_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination", '404': "str", '500': "str", } @@ -289062,7 +289062,7 @@ async def index_twcert_get_without_preload_content( return response_data.response - def _index_twcert_get_serialize( + def _index_trendmicro_get_serialize( self, page, limit, @@ -289230,7 +289230,7 @@ def _index_twcert_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/twcert', + resource_path='/v3/index/trendmicro', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -289247,7 +289247,7 @@ def _index_twcert_get_serialize( @validate_call - async def index_ubiquiti_get( + async def index_trustwave_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -289285,10 +289285,10 @@ async def index_ubiquiti_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination: - """Return vulnerability data stored in index \"ubiquiti\" + ) -> RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination: + """Return vulnerability data stored in index \"trustwave\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubiquiti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubiquiti Security Advisory Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubiquiti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubiquiti?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trustwave index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trustwave Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trustwave?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trustwave?cursor=` :param page: set the page number of the response :type page: int @@ -289360,7 +289360,7 @@ async def index_ubiquiti_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ubiquiti_get_serialize( + _param = self._index_trustwave_get_serialize( page=page, limit=limit, cursor=cursor, @@ -289392,7 +289392,7 @@ async def index_ubiquiti_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination", '404': "str", '500': "str", } @@ -289408,7 +289408,7 @@ async def index_ubiquiti_get( @validate_call - async def index_ubiquiti_get_with_http_info( + async def index_trustwave_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -289446,10 +289446,10 @@ async def index_ubiquiti_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination]: - """Return vulnerability data stored in index \"ubiquiti\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination]: + """Return vulnerability data stored in index \"trustwave\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubiquiti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubiquiti Security Advisory Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubiquiti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubiquiti?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trustwave index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trustwave Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trustwave?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trustwave?cursor=` :param page: set the page number of the response :type page: int @@ -289521,7 +289521,7 @@ async def index_ubiquiti_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ubiquiti_get_serialize( + _param = self._index_trustwave_get_serialize( page=page, limit=limit, cursor=cursor, @@ -289553,7 +289553,7 @@ async def index_ubiquiti_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination", '404': "str", '500': "str", } @@ -289569,7 +289569,7 @@ async def index_ubiquiti_get_with_http_info( @validate_call - async def index_ubiquiti_get_without_preload_content( + async def index_trustwave_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -289608,9 +289608,9 @@ async def index_ubiquiti_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ubiquiti\" + """Return vulnerability data stored in index \"trustwave\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubiquiti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubiquiti Security Advisory Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubiquiti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubiquiti?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trustwave index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trustwave Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trustwave?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trustwave?cursor=` :param page: set the page number of the response :type page: int @@ -289682,7 +289682,7 @@ async def index_ubiquiti_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ubiquiti_get_serialize( + _param = self._index_trustwave_get_serialize( page=page, limit=limit, cursor=cursor, @@ -289714,7 +289714,7 @@ async def index_ubiquiti_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination", '404': "str", '500': "str", } @@ -289725,7 +289725,7 @@ async def index_ubiquiti_get_without_preload_content( return response_data.response - def _index_ubiquiti_get_serialize( + def _index_trustwave_get_serialize( self, page, limit, @@ -289893,7 +289893,7 @@ def _index_ubiquiti_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ubiquiti', + resource_path='/v3/index/trustwave', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -289910,7 +289910,7 @@ def _index_ubiquiti_get_serialize( @validate_call - async def index_ubuntu_get( + async def index_twcert_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -289948,10 +289948,10 @@ async def index_ubuntu_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination: - """Return vulnerability data stored in index \"ubuntu\" + ) -> RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"twcert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubuntu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubuntu Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubuntu?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the twcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Taiwan CERT Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/twcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/twcert?cursor=` :param page: set the page number of the response :type page: int @@ -290023,7 +290023,7 @@ async def index_ubuntu_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ubuntu_get_serialize( + _param = self._index_twcert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -290055,7 +290055,7 @@ async def index_ubuntu_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -290071,7 +290071,7 @@ async def index_ubuntu_get( @validate_call - async def index_ubuntu_get_with_http_info( + async def index_twcert_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -290109,10 +290109,10 @@ async def index_ubuntu_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination]: - """Return vulnerability data stored in index \"ubuntu\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"twcert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubuntu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubuntu Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubuntu?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the twcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Taiwan CERT Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/twcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/twcert?cursor=` :param page: set the page number of the response :type page: int @@ -290184,7 +290184,7 @@ async def index_ubuntu_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ubuntu_get_serialize( + _param = self._index_twcert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -290216,7 +290216,7 @@ async def index_ubuntu_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -290232,7 +290232,7 @@ async def index_ubuntu_get_with_http_info( @validate_call - async def index_ubuntu_get_without_preload_content( + async def index_twcert_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -290271,9 +290271,9 @@ async def index_ubuntu_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ubuntu\" + """Return vulnerability data stored in index \"twcert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubuntu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubuntu Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubuntu?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the twcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Taiwan CERT Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/twcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/twcert?cursor=` :param page: set the page number of the response :type page: int @@ -290345,7 +290345,7 @@ async def index_ubuntu_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ubuntu_get_serialize( + _param = self._index_twcert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -290377,7 +290377,7 @@ async def index_ubuntu_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -290388,7 +290388,7 @@ async def index_ubuntu_get_without_preload_content( return response_data.response - def _index_ubuntu_get_serialize( + def _index_twcert_get_serialize( self, page, limit, @@ -290556,7 +290556,7 @@ def _index_ubuntu_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ubuntu', + resource_path='/v3/index/twcert', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -290573,7 +290573,7 @@ def _index_ubuntu_get_serialize( @validate_call - async def index_ubuntu_purls_get( + async def index_ubiquiti_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -290611,10 +290611,10 @@ async def index_ubuntu_purls_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination: - """Return vulnerability data stored in index \"ubuntu-purls\" + ) -> RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination: + """Return vulnerability data stored in index \"ubiquiti\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubuntu-purls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubuntu Purls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu-purls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubuntu-purls?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubiquiti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubiquiti Security Advisory Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubiquiti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubiquiti?cursor=` :param page: set the page number of the response :type page: int @@ -290686,7 +290686,7 @@ async def index_ubuntu_purls_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ubuntu_purls_get_serialize( + _param = self._index_ubiquiti_get_serialize( page=page, limit=limit, cursor=cursor, @@ -290718,7 +290718,7 @@ async def index_ubuntu_purls_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination", '404': "str", '500': "str", } @@ -290734,7 +290734,7 @@ async def index_ubuntu_purls_get( @validate_call - async def index_ubuntu_purls_get_with_http_info( + async def index_ubiquiti_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -290772,10 +290772,10 @@ async def index_ubuntu_purls_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination]: - """Return vulnerability data stored in index \"ubuntu-purls\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination]: + """Return vulnerability data stored in index \"ubiquiti\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubuntu-purls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubuntu Purls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu-purls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubuntu-purls?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubiquiti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubiquiti Security Advisory Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubiquiti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubiquiti?cursor=` :param page: set the page number of the response :type page: int @@ -290847,7 +290847,7 @@ async def index_ubuntu_purls_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ubuntu_purls_get_serialize( + _param = self._index_ubiquiti_get_serialize( page=page, limit=limit, cursor=cursor, @@ -290879,7 +290879,7 @@ async def index_ubuntu_purls_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination", '404': "str", '500': "str", } @@ -290895,7 +290895,7 @@ async def index_ubuntu_purls_get_with_http_info( @validate_call - async def index_ubuntu_purls_get_without_preload_content( + async def index_ubiquiti_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -290934,9 +290934,9 @@ async def index_ubuntu_purls_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ubuntu-purls\" + """Return vulnerability data stored in index \"ubiquiti\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubuntu-purls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubuntu Purls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu-purls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubuntu-purls?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubiquiti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubiquiti Security Advisory Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubiquiti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubiquiti?cursor=` :param page: set the page number of the response :type page: int @@ -291008,7 +291008,7 @@ async def index_ubuntu_purls_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ubuntu_purls_get_serialize( + _param = self._index_ubiquiti_get_serialize( page=page, limit=limit, cursor=cursor, @@ -291040,7 +291040,7 @@ async def index_ubuntu_purls_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination", '404': "str", '500': "str", } @@ -291051,7 +291051,7 @@ async def index_ubuntu_purls_get_without_preload_content( return response_data.response - def _index_ubuntu_purls_get_serialize( + def _index_ubiquiti_get_serialize( self, page, limit, @@ -291219,7 +291219,7 @@ def _index_ubuntu_purls_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ubuntu-purls', + resource_path='/v3/index/ubiquiti', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -291236,7 +291236,7 @@ def _index_ubuntu_purls_get_serialize( @validate_call - async def index_unify_get( + async def index_ubuntu_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -291274,10 +291274,10 @@ async def index_unify_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination: - """Return vulnerability data stored in index \"unify\" + ) -> RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination: + """Return vulnerability data stored in index \"ubuntu\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the unify index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Unify Product Security Advisories and Security Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/unify?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/unify?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubuntu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubuntu Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubuntu?cursor=` :param page: set the page number of the response :type page: int @@ -291349,7 +291349,7 @@ async def index_unify_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_unify_get_serialize( + _param = self._index_ubuntu_get_serialize( page=page, limit=limit, cursor=cursor, @@ -291381,7 +291381,7 @@ async def index_unify_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination", '404': "str", '500': "str", } @@ -291397,7 +291397,7 @@ async def index_unify_get( @validate_call - async def index_unify_get_with_http_info( + async def index_ubuntu_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -291435,10 +291435,10 @@ async def index_unify_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination]: - """Return vulnerability data stored in index \"unify\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination]: + """Return vulnerability data stored in index \"ubuntu\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the unify index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Unify Product Security Advisories and Security Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/unify?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/unify?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubuntu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubuntu Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubuntu?cursor=` :param page: set the page number of the response :type page: int @@ -291510,7 +291510,7 @@ async def index_unify_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_unify_get_serialize( + _param = self._index_ubuntu_get_serialize( page=page, limit=limit, cursor=cursor, @@ -291542,7 +291542,7 @@ async def index_unify_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination", '404': "str", '500': "str", } @@ -291558,7 +291558,7 @@ async def index_unify_get_with_http_info( @validate_call - async def index_unify_get_without_preload_content( + async def index_ubuntu_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -291597,9 +291597,9 @@ async def index_unify_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"unify\" + """Return vulnerability data stored in index \"ubuntu\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the unify index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Unify Product Security Advisories and Security Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/unify?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/unify?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubuntu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubuntu Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubuntu?cursor=` :param page: set the page number of the response :type page: int @@ -291671,7 +291671,7 @@ async def index_unify_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_unify_get_serialize( + _param = self._index_ubuntu_get_serialize( page=page, limit=limit, cursor=cursor, @@ -291703,7 +291703,7 @@ async def index_unify_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination", '404': "str", '500': "str", } @@ -291714,7 +291714,7 @@ async def index_unify_get_without_preload_content( return response_data.response - def _index_unify_get_serialize( + def _index_ubuntu_get_serialize( self, page, limit, @@ -291882,7 +291882,7 @@ def _index_unify_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/unify', + resource_path='/v3/index/ubuntu', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -291899,7 +291899,7 @@ def _index_unify_get_serialize( @validate_call - async def index_unisoc_get( + async def index_ubuntu_purls_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -291937,10 +291937,10 @@ async def index_unisoc_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination: - """Return vulnerability data stored in index \"unisoc\" + ) -> RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination: + """Return vulnerability data stored in index \"ubuntu-purls\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the unisoc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** UNISOC Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/unisoc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/unisoc?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubuntu-purls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubuntu Purls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu-purls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubuntu-purls?cursor=` :param page: set the page number of the response :type page: int @@ -292012,7 +292012,7 @@ async def index_unisoc_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_unisoc_get_serialize( + _param = self._index_ubuntu_purls_get_serialize( page=page, limit=limit, cursor=cursor, @@ -292044,7 +292044,7 @@ async def index_unisoc_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination", + '200': "RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination", '404': "str", '500': "str", } @@ -292060,7 +292060,7 @@ async def index_unisoc_get( @validate_call - async def index_unisoc_get_with_http_info( + async def index_ubuntu_purls_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -292098,10 +292098,10 @@ async def index_unisoc_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination]: - """Return vulnerability data stored in index \"unisoc\" + ) -> ApiResponse[RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination]: + """Return vulnerability data stored in index \"ubuntu-purls\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the unisoc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** UNISOC Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/unisoc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/unisoc?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubuntu-purls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubuntu Purls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu-purls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubuntu-purls?cursor=` :param page: set the page number of the response :type page: int @@ -292173,7 +292173,7 @@ async def index_unisoc_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_unisoc_get_serialize( + _param = self._index_ubuntu_purls_get_serialize( page=page, limit=limit, cursor=cursor, @@ -292205,7 +292205,7 @@ async def index_unisoc_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination", + '200': "RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination", '404': "str", '500': "str", } @@ -292221,7 +292221,7 @@ async def index_unisoc_get_with_http_info( @validate_call - async def index_unisoc_get_without_preload_content( + async def index_ubuntu_purls_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -292260,9 +292260,9 @@ async def index_unisoc_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"unisoc\" + """Return vulnerability data stored in index \"ubuntu-purls\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the unisoc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** UNISOC Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/unisoc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/unisoc?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubuntu-purls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubuntu Purls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu-purls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubuntu-purls?cursor=` :param page: set the page number of the response :type page: int @@ -292334,7 +292334,7 @@ async def index_unisoc_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_unisoc_get_serialize( + _param = self._index_ubuntu_purls_get_serialize( page=page, limit=limit, cursor=cursor, @@ -292366,7 +292366,7 @@ async def index_unisoc_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination", + '200': "RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination", '404': "str", '500': "str", } @@ -292377,7 +292377,7 @@ async def index_unisoc_get_without_preload_content( return response_data.response - def _index_unisoc_get_serialize( + def _index_ubuntu_purls_get_serialize( self, page, limit, @@ -292545,7 +292545,7 @@ def _index_unisoc_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/unisoc', + resource_path='/v3/index/ubuntu-purls', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -292562,7 +292562,7 @@ def _index_unisoc_get_serialize( @validate_call - async def index_usd_get( + async def index_unify_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -292600,10 +292600,10 @@ async def index_usd_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination: - """Return vulnerability data stored in index \"usd\" + ) -> RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination: + """Return vulnerability data stored in index \"unify\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the usd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** usd Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/usd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/usd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the unify index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Unify Product Security Advisories and Security Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/unify?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/unify?cursor=` :param page: set the page number of the response :type page: int @@ -292675,7 +292675,7 @@ async def index_usd_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_usd_get_serialize( + _param = self._index_unify_get_serialize( page=page, limit=limit, cursor=cursor, @@ -292707,7 +292707,7 @@ async def index_usd_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination", '404': "str", '500': "str", } @@ -292723,7 +292723,7 @@ async def index_usd_get( @validate_call - async def index_usd_get_with_http_info( + async def index_unify_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -292761,10 +292761,10 @@ async def index_usd_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination]: - """Return vulnerability data stored in index \"usd\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination]: + """Return vulnerability data stored in index \"unify\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the usd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** usd Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/usd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/usd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the unify index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Unify Product Security Advisories and Security Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/unify?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/unify?cursor=` :param page: set the page number of the response :type page: int @@ -292836,7 +292836,7 @@ async def index_usd_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_usd_get_serialize( + _param = self._index_unify_get_serialize( page=page, limit=limit, cursor=cursor, @@ -292868,7 +292868,7 @@ async def index_usd_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination", '404': "str", '500': "str", } @@ -292884,7 +292884,7 @@ async def index_usd_get_with_http_info( @validate_call - async def index_usd_get_without_preload_content( + async def index_unify_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -292923,9 +292923,9 @@ async def index_usd_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"usd\" + """Return vulnerability data stored in index \"unify\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the usd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** usd Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/usd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/usd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the unify index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Unify Product Security Advisories and Security Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/unify?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/unify?cursor=` :param page: set the page number of the response :type page: int @@ -292997,7 +292997,7 @@ async def index_usd_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_usd_get_serialize( + _param = self._index_unify_get_serialize( page=page, limit=limit, cursor=cursor, @@ -293029,7 +293029,7 @@ async def index_usd_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination", '404': "str", '500': "str", } @@ -293040,7 +293040,7 @@ async def index_usd_get_without_preload_content( return response_data.response - def _index_usd_get_serialize( + def _index_unify_get_serialize( self, page, limit, @@ -293208,7 +293208,7 @@ def _index_usd_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/usd', + resource_path='/v3/index/unify', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -293225,7 +293225,7 @@ def _index_usd_get_serialize( @validate_call - async def index_usom_get( + async def index_unisoc_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -293263,10 +293263,10 @@ async def index_usom_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"usom\" + ) -> RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination: + """Return vulnerability data stored in index \"unisoc\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the usom index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** USOM Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/usom?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/usom?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the unisoc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** UNISOC Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/unisoc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/unisoc?cursor=` :param page: set the page number of the response :type page: int @@ -293338,7 +293338,7 @@ async def index_usom_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_usom_get_serialize( + _param = self._index_unisoc_get_serialize( page=page, limit=limit, cursor=cursor, @@ -293370,7 +293370,7 @@ async def index_usom_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination", '404': "str", '500': "str", } @@ -293386,7 +293386,7 @@ async def index_usom_get( @validate_call - async def index_usom_get_with_http_info( + async def index_unisoc_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -293424,10 +293424,10 @@ async def index_usom_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"usom\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination]: + """Return vulnerability data stored in index \"unisoc\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the usom index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** USOM Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/usom?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/usom?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the unisoc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** UNISOC Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/unisoc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/unisoc?cursor=` :param page: set the page number of the response :type page: int @@ -293499,7 +293499,7 @@ async def index_usom_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_usom_get_serialize( + _param = self._index_unisoc_get_serialize( page=page, limit=limit, cursor=cursor, @@ -293531,7 +293531,7 @@ async def index_usom_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination", '404': "str", '500': "str", } @@ -293547,7 +293547,7 @@ async def index_usom_get_with_http_info( @validate_call - async def index_usom_get_without_preload_content( + async def index_unisoc_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -293586,9 +293586,9 @@ async def index_usom_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"usom\" + """Return vulnerability data stored in index \"unisoc\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the usom index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** USOM Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/usom?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/usom?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the unisoc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** UNISOC Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/unisoc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/unisoc?cursor=` :param page: set the page number of the response :type page: int @@ -293660,7 +293660,7 @@ async def index_usom_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_usom_get_serialize( + _param = self._index_unisoc_get_serialize( page=page, limit=limit, cursor=cursor, @@ -293692,7 +293692,7 @@ async def index_usom_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination", '404': "str", '500': "str", } @@ -293703,7 +293703,7 @@ async def index_usom_get_without_preload_content( return response_data.response - def _index_usom_get_serialize( + def _index_unisoc_get_serialize( self, page, limit, @@ -293871,7 +293871,7 @@ def _index_usom_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/usom', + resource_path='/v3/index/unisoc', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -293888,7 +293888,7 @@ def _index_usom_get_serialize( @validate_call - async def index_vandyke_get( + async def index_usd_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -293926,10 +293926,10 @@ async def index_vandyke_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination: - """Return vulnerability data stored in index \"vandyke\" + ) -> RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination: + """Return vulnerability data stored in index \"usd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vandyke index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VanDyke Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vandyke?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vandyke?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the usd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** usd Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/usd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/usd?cursor=` :param page: set the page number of the response :type page: int @@ -294001,7 +294001,7 @@ async def index_vandyke_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vandyke_get_serialize( + _param = self._index_usd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -294033,7 +294033,7 @@ async def index_vandyke_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination", '404': "str", '500': "str", } @@ -294049,7 +294049,7 @@ async def index_vandyke_get( @validate_call - async def index_vandyke_get_with_http_info( + async def index_usd_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -294087,10 +294087,10 @@ async def index_vandyke_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination]: - """Return vulnerability data stored in index \"vandyke\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination]: + """Return vulnerability data stored in index \"usd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vandyke index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VanDyke Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vandyke?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vandyke?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the usd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** usd Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/usd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/usd?cursor=` :param page: set the page number of the response :type page: int @@ -294162,7 +294162,7 @@ async def index_vandyke_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vandyke_get_serialize( + _param = self._index_usd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -294194,7 +294194,7 @@ async def index_vandyke_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination", '404': "str", '500': "str", } @@ -294210,7 +294210,7 @@ async def index_vandyke_get_with_http_info( @validate_call - async def index_vandyke_get_without_preload_content( + async def index_usd_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -294249,9 +294249,9 @@ async def index_vandyke_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"vandyke\" + """Return vulnerability data stored in index \"usd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vandyke index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VanDyke Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vandyke?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vandyke?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the usd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** usd Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/usd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/usd?cursor=` :param page: set the page number of the response :type page: int @@ -294323,7 +294323,7 @@ async def index_vandyke_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vandyke_get_serialize( + _param = self._index_usd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -294355,7 +294355,7 @@ async def index_vandyke_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination", '404': "str", '500': "str", } @@ -294366,7 +294366,7 @@ async def index_vandyke_get_without_preload_content( return response_data.response - def _index_vandyke_get_serialize( + def _index_usd_get_serialize( self, page, limit, @@ -294534,7 +294534,7 @@ def _index_vandyke_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/vandyke', + resource_path='/v3/index/usd', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -294551,7 +294551,7 @@ def _index_vandyke_get_serialize( @validate_call - async def index_vapidlabs_get( + async def index_usom_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -294589,10 +294589,10 @@ async def index_vapidlabs_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"vapidlabs\" + ) -> RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"usom\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vapidlabs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VapidLabs Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vapidlabs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vapidlabs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the usom index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** USOM Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/usom?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/usom?cursor=` :param page: set the page number of the response :type page: int @@ -294664,7 +294664,7 @@ async def index_vapidlabs_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vapidlabs_get_serialize( + _param = self._index_usom_get_serialize( page=page, limit=limit, cursor=cursor, @@ -294696,7 +294696,7 @@ async def index_vapidlabs_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -294712,7 +294712,7 @@ async def index_vapidlabs_get( @validate_call - async def index_vapidlabs_get_with_http_info( + async def index_usom_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -294750,10 +294750,10 @@ async def index_vapidlabs_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"vapidlabs\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"usom\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vapidlabs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VapidLabs Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vapidlabs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vapidlabs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the usom index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** USOM Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/usom?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/usom?cursor=` :param page: set the page number of the response :type page: int @@ -294825,7 +294825,7 @@ async def index_vapidlabs_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vapidlabs_get_serialize( + _param = self._index_usom_get_serialize( page=page, limit=limit, cursor=cursor, @@ -294857,7 +294857,7 @@ async def index_vapidlabs_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -294873,7 +294873,7 @@ async def index_vapidlabs_get_with_http_info( @validate_call - async def index_vapidlabs_get_without_preload_content( + async def index_usom_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -294912,9 +294912,9 @@ async def index_vapidlabs_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"vapidlabs\" + """Return vulnerability data stored in index \"usom\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vapidlabs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VapidLabs Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vapidlabs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vapidlabs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the usom index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** USOM Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/usom?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/usom?cursor=` :param page: set the page number of the response :type page: int @@ -294986,7 +294986,7 @@ async def index_vapidlabs_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vapidlabs_get_serialize( + _param = self._index_usom_get_serialize( page=page, limit=limit, cursor=cursor, @@ -295018,7 +295018,7 @@ async def index_vapidlabs_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -295029,7 +295029,7 @@ async def index_vapidlabs_get_without_preload_content( return response_data.response - def _index_vapidlabs_get_serialize( + def _index_usom_get_serialize( self, page, limit, @@ -295197,7 +295197,7 @@ def _index_vapidlabs_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/vapidlabs', + resource_path='/v3/index/usom', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -295214,7 +295214,7 @@ def _index_vapidlabs_get_serialize( @validate_call - async def index_vc_cpe_dictionary_get( + async def index_vandyke_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -295252,10 +295252,10 @@ async def index_vc_cpe_dictionary_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination: - """Return vulnerability data stored in index \"vc-cpe-dictionary\" + ) -> RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination: + """Return vulnerability data stored in index \"vandyke\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vc-cpe-dictionary index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck CPE Dictionary ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vc-cpe-dictionary?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vc-cpe-dictionary?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vandyke index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VanDyke Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vandyke?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vandyke?cursor=` :param page: set the page number of the response :type page: int @@ -295327,7 +295327,7 @@ async def index_vc_cpe_dictionary_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vc_cpe_dictionary_get_serialize( + _param = self._index_vandyke_get_serialize( page=page, limit=limit, cursor=cursor, @@ -295359,7 +295359,7 @@ async def index_vc_cpe_dictionary_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination", '404': "str", '500': "str", } @@ -295375,7 +295375,7 @@ async def index_vc_cpe_dictionary_get( @validate_call - async def index_vc_cpe_dictionary_get_with_http_info( + async def index_vandyke_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -295413,10 +295413,10 @@ async def index_vc_cpe_dictionary_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination]: - """Return vulnerability data stored in index \"vc-cpe-dictionary\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination]: + """Return vulnerability data stored in index \"vandyke\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vc-cpe-dictionary index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck CPE Dictionary ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vc-cpe-dictionary?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vc-cpe-dictionary?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vandyke index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VanDyke Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vandyke?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vandyke?cursor=` :param page: set the page number of the response :type page: int @@ -295488,7 +295488,7 @@ async def index_vc_cpe_dictionary_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vc_cpe_dictionary_get_serialize( + _param = self._index_vandyke_get_serialize( page=page, limit=limit, cursor=cursor, @@ -295520,7 +295520,7 @@ async def index_vc_cpe_dictionary_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination", '404': "str", '500': "str", } @@ -295536,7 +295536,7 @@ async def index_vc_cpe_dictionary_get_with_http_info( @validate_call - async def index_vc_cpe_dictionary_get_without_preload_content( + async def index_vandyke_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -295575,9 +295575,9 @@ async def index_vc_cpe_dictionary_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"vc-cpe-dictionary\" + """Return vulnerability data stored in index \"vandyke\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vc-cpe-dictionary index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck CPE Dictionary ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vc-cpe-dictionary?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vc-cpe-dictionary?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vandyke index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VanDyke Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vandyke?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vandyke?cursor=` :param page: set the page number of the response :type page: int @@ -295649,7 +295649,7 @@ async def index_vc_cpe_dictionary_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vc_cpe_dictionary_get_serialize( + _param = self._index_vandyke_get_serialize( page=page, limit=limit, cursor=cursor, @@ -295681,7 +295681,7 @@ async def index_vc_cpe_dictionary_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination", '404': "str", '500': "str", } @@ -295692,7 +295692,7 @@ async def index_vc_cpe_dictionary_get_without_preload_content( return response_data.response - def _index_vc_cpe_dictionary_get_serialize( + def _index_vandyke_get_serialize( self, page, limit, @@ -295860,7 +295860,7 @@ def _index_vc_cpe_dictionary_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/vc-cpe-dictionary', + resource_path='/v3/index/vandyke', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -295877,7 +295877,7 @@ def _index_vc_cpe_dictionary_get_serialize( @validate_call - async def index_vde_get( + async def index_vapidlabs_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -295915,10 +295915,10 @@ async def index_vde_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"vde\" + ) -> RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"vapidlabs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vde index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VDE CERT Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vde?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vde?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vapidlabs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VapidLabs Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vapidlabs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vapidlabs?cursor=` :param page: set the page number of the response :type page: int @@ -295990,7 +295990,7 @@ async def index_vde_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vde_get_serialize( + _param = self._index_vapidlabs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -296022,7 +296022,7 @@ async def index_vde_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -296038,7 +296038,7 @@ async def index_vde_get( @validate_call - async def index_vde_get_with_http_info( + async def index_vapidlabs_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -296076,10 +296076,10 @@ async def index_vde_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"vde\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"vapidlabs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vde index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VDE CERT Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vde?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vde?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vapidlabs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VapidLabs Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vapidlabs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vapidlabs?cursor=` :param page: set the page number of the response :type page: int @@ -296151,7 +296151,7 @@ async def index_vde_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vde_get_serialize( + _param = self._index_vapidlabs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -296183,7 +296183,7 @@ async def index_vde_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -296199,7 +296199,7 @@ async def index_vde_get_with_http_info( @validate_call - async def index_vde_get_without_preload_content( + async def index_vapidlabs_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -296238,9 +296238,9 @@ async def index_vde_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"vde\" + """Return vulnerability data stored in index \"vapidlabs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vde index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VDE CERT Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vde?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vde?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vapidlabs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VapidLabs Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vapidlabs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vapidlabs?cursor=` :param page: set the page number of the response :type page: int @@ -296312,7 +296312,7 @@ async def index_vde_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vde_get_serialize( + _param = self._index_vapidlabs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -296344,7 +296344,7 @@ async def index_vde_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -296355,7 +296355,7 @@ async def index_vde_get_without_preload_content( return response_data.response - def _index_vde_get_serialize( + def _index_vapidlabs_get_serialize( self, page, limit, @@ -296523,7 +296523,7 @@ def _index_vde_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/vde', + resource_path='/v3/index/vapidlabs', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -296540,7 +296540,7 @@ def _index_vde_get_serialize( @validate_call - async def index_veeam_get( + async def index_vc_cpe_dictionary_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -296578,10 +296578,10 @@ async def index_veeam_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination: - """Return vulnerability data stored in index \"veeam\" + ) -> RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination: + """Return vulnerability data stored in index \"vc-cpe-dictionary\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the veeam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Veeam Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/veeam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/veeam?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vc-cpe-dictionary index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck CPE Dictionary ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vc-cpe-dictionary?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vc-cpe-dictionary?cursor=` :param page: set the page number of the response :type page: int @@ -296653,7 +296653,7 @@ async def index_veeam_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_veeam_get_serialize( + _param = self._index_vc_cpe_dictionary_get_serialize( page=page, limit=limit, cursor=cursor, @@ -296685,7 +296685,7 @@ async def index_veeam_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination", '404': "str", '500': "str", } @@ -296701,7 +296701,7 @@ async def index_veeam_get( @validate_call - async def index_veeam_get_with_http_info( + async def index_vc_cpe_dictionary_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -296739,10 +296739,10 @@ async def index_veeam_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination]: - """Return vulnerability data stored in index \"veeam\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination]: + """Return vulnerability data stored in index \"vc-cpe-dictionary\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the veeam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Veeam Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/veeam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/veeam?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vc-cpe-dictionary index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck CPE Dictionary ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vc-cpe-dictionary?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vc-cpe-dictionary?cursor=` :param page: set the page number of the response :type page: int @@ -296814,7 +296814,7 @@ async def index_veeam_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_veeam_get_serialize( + _param = self._index_vc_cpe_dictionary_get_serialize( page=page, limit=limit, cursor=cursor, @@ -296846,7 +296846,7 @@ async def index_veeam_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination", '404': "str", '500': "str", } @@ -296862,7 +296862,7 @@ async def index_veeam_get_with_http_info( @validate_call - async def index_veeam_get_without_preload_content( + async def index_vc_cpe_dictionary_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -296901,9 +296901,9 @@ async def index_veeam_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"veeam\" + """Return vulnerability data stored in index \"vc-cpe-dictionary\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the veeam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Veeam Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/veeam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/veeam?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vc-cpe-dictionary index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck CPE Dictionary ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vc-cpe-dictionary?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vc-cpe-dictionary?cursor=` :param page: set the page number of the response :type page: int @@ -296975,7 +296975,7 @@ async def index_veeam_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_veeam_get_serialize( + _param = self._index_vc_cpe_dictionary_get_serialize( page=page, limit=limit, cursor=cursor, @@ -297007,7 +297007,7 @@ async def index_veeam_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination", '404': "str", '500': "str", } @@ -297018,7 +297018,7 @@ async def index_veeam_get_without_preload_content( return response_data.response - def _index_veeam_get_serialize( + def _index_vc_cpe_dictionary_get_serialize( self, page, limit, @@ -297186,7 +297186,7 @@ def _index_veeam_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/veeam', + resource_path='/v3/index/vc-cpe-dictionary', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -297203,7 +297203,7 @@ def _index_veeam_get_serialize( @validate_call - async def index_veritas_get( + async def index_vde_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -297241,10 +297241,10 @@ async def index_veritas_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination: - """Return vulnerability data stored in index \"veritas\" + ) -> RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"vde\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the veritas index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Veritas Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/veritas?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/veritas?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vde index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VDE CERT Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vde?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vde?cursor=` :param page: set the page number of the response :type page: int @@ -297316,7 +297316,7 @@ async def index_veritas_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_veritas_get_serialize( + _param = self._index_vde_get_serialize( page=page, limit=limit, cursor=cursor, @@ -297348,7 +297348,7 @@ async def index_veritas_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -297364,7 +297364,7 @@ async def index_veritas_get( @validate_call - async def index_veritas_get_with_http_info( + async def index_vde_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -297402,10 +297402,10 @@ async def index_veritas_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination]: - """Return vulnerability data stored in index \"veritas\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"vde\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the veritas index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Veritas Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/veritas?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/veritas?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vde index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VDE CERT Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vde?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vde?cursor=` :param page: set the page number of the response :type page: int @@ -297477,7 +297477,7 @@ async def index_veritas_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_veritas_get_serialize( + _param = self._index_vde_get_serialize( page=page, limit=limit, cursor=cursor, @@ -297509,7 +297509,7 @@ async def index_veritas_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -297525,7 +297525,7 @@ async def index_veritas_get_with_http_info( @validate_call - async def index_veritas_get_without_preload_content( + async def index_vde_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -297564,9 +297564,9 @@ async def index_veritas_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"veritas\" + """Return vulnerability data stored in index \"vde\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the veritas index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Veritas Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/veritas?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/veritas?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vde index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VDE CERT Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vde?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vde?cursor=` :param page: set the page number of the response :type page: int @@ -297638,7 +297638,7 @@ async def index_veritas_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_veritas_get_serialize( + _param = self._index_vde_get_serialize( page=page, limit=limit, cursor=cursor, @@ -297670,7 +297670,7 @@ async def index_veritas_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -297681,7 +297681,7 @@ async def index_veritas_get_without_preload_content( return response_data.response - def _index_veritas_get_serialize( + def _index_vde_get_serialize( self, page, limit, @@ -297849,7 +297849,7 @@ def _index_veritas_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/veritas', + resource_path='/v3/index/vde', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -297866,7 +297866,7 @@ def _index_veritas_get_serialize( @validate_call - async def index_virtuozzo_get( + async def index_veeam_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -297904,10 +297904,10 @@ async def index_virtuozzo_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination: - """Return vulnerability data stored in index \"virtuozzo\" + ) -> RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination: + """Return vulnerability data stored in index \"veeam\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the virtuozzo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Virtuozzo Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/virtuozzo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/virtuozzo?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the veeam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Veeam Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/veeam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/veeam?cursor=` :param page: set the page number of the response :type page: int @@ -297979,7 +297979,7 @@ async def index_virtuozzo_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_virtuozzo_get_serialize( + _param = self._index_veeam_get_serialize( page=page, limit=limit, cursor=cursor, @@ -298011,7 +298011,7 @@ async def index_virtuozzo_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination", '404': "str", '500': "str", } @@ -298027,7 +298027,7 @@ async def index_virtuozzo_get( @validate_call - async def index_virtuozzo_get_with_http_info( + async def index_veeam_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -298065,10 +298065,10 @@ async def index_virtuozzo_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination]: - """Return vulnerability data stored in index \"virtuozzo\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination]: + """Return vulnerability data stored in index \"veeam\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the virtuozzo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Virtuozzo Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/virtuozzo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/virtuozzo?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the veeam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Veeam Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/veeam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/veeam?cursor=` :param page: set the page number of the response :type page: int @@ -298140,7 +298140,7 @@ async def index_virtuozzo_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_virtuozzo_get_serialize( + _param = self._index_veeam_get_serialize( page=page, limit=limit, cursor=cursor, @@ -298172,7 +298172,7 @@ async def index_virtuozzo_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination", '404': "str", '500': "str", } @@ -298188,7 +298188,7 @@ async def index_virtuozzo_get_with_http_info( @validate_call - async def index_virtuozzo_get_without_preload_content( + async def index_veeam_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -298227,9 +298227,9 @@ async def index_virtuozzo_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"virtuozzo\" + """Return vulnerability data stored in index \"veeam\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the virtuozzo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Virtuozzo Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/virtuozzo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/virtuozzo?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the veeam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Veeam Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/veeam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/veeam?cursor=` :param page: set the page number of the response :type page: int @@ -298301,7 +298301,7 @@ async def index_virtuozzo_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_virtuozzo_get_serialize( + _param = self._index_veeam_get_serialize( page=page, limit=limit, cursor=cursor, @@ -298333,7 +298333,7 @@ async def index_virtuozzo_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination", '404': "str", '500': "str", } @@ -298344,7 +298344,7 @@ async def index_virtuozzo_get_without_preload_content( return response_data.response - def _index_virtuozzo_get_serialize( + def _index_veeam_get_serialize( self, page, limit, @@ -298512,7 +298512,7 @@ def _index_virtuozzo_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/virtuozzo', + resource_path='/v3/index/veeam', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -298529,7 +298529,7 @@ def _index_virtuozzo_get_serialize( @validate_call - async def index_vlc_get( + async def index_veritas_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -298567,10 +298567,10 @@ async def index_vlc_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination: - """Return vulnerability data stored in index \"vlc\" + ) -> RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination: + """Return vulnerability data stored in index \"veritas\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vlc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VLC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vlc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vlc?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the veritas index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Veritas Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/veritas?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/veritas?cursor=` :param page: set the page number of the response :type page: int @@ -298642,7 +298642,7 @@ async def index_vlc_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vlc_get_serialize( + _param = self._index_veritas_get_serialize( page=page, limit=limit, cursor=cursor, @@ -298674,7 +298674,7 @@ async def index_vlc_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination", '404': "str", '500': "str", } @@ -298690,7 +298690,7 @@ async def index_vlc_get( @validate_call - async def index_vlc_get_with_http_info( + async def index_veritas_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -298728,10 +298728,10 @@ async def index_vlc_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination]: - """Return vulnerability data stored in index \"vlc\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination]: + """Return vulnerability data stored in index \"veritas\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vlc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VLC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vlc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vlc?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the veritas index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Veritas Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/veritas?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/veritas?cursor=` :param page: set the page number of the response :type page: int @@ -298803,7 +298803,7 @@ async def index_vlc_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vlc_get_serialize( + _param = self._index_veritas_get_serialize( page=page, limit=limit, cursor=cursor, @@ -298835,7 +298835,7 @@ async def index_vlc_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination", '404': "str", '500': "str", } @@ -298851,7 +298851,7 @@ async def index_vlc_get_with_http_info( @validate_call - async def index_vlc_get_without_preload_content( + async def index_veritas_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -298890,9 +298890,9 @@ async def index_vlc_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"vlc\" + """Return vulnerability data stored in index \"veritas\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vlc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VLC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vlc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vlc?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the veritas index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Veritas Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/veritas?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/veritas?cursor=` :param page: set the page number of the response :type page: int @@ -298964,7 +298964,7 @@ async def index_vlc_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vlc_get_serialize( + _param = self._index_veritas_get_serialize( page=page, limit=limit, cursor=cursor, @@ -298996,7 +298996,7 @@ async def index_vlc_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination", '404': "str", '500': "str", } @@ -299007,7 +299007,7 @@ async def index_vlc_get_without_preload_content( return response_data.response - def _index_vlc_get_serialize( + def _index_veritas_get_serialize( self, page, limit, @@ -299175,7 +299175,7 @@ def _index_vlc_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/vlc', + resource_path='/v3/index/veritas', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -299192,7 +299192,7 @@ def _index_vlc_get_serialize( @validate_call - async def index_vmware_get( + async def index_virtuozzo_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -299230,10 +299230,10 @@ async def index_vmware_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"vmware\" + ) -> RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination: + """Return vulnerability data stored in index \"virtuozzo\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vmware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VMWare Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vmware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vmware?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the virtuozzo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Virtuozzo Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/virtuozzo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/virtuozzo?cursor=` :param page: set the page number of the response :type page: int @@ -299305,7 +299305,7 @@ async def index_vmware_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vmware_get_serialize( + _param = self._index_virtuozzo_get_serialize( page=page, limit=limit, cursor=cursor, @@ -299337,7 +299337,7 @@ async def index_vmware_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination", '404': "str", '500': "str", } @@ -299353,7 +299353,7 @@ async def index_vmware_get( @validate_call - async def index_vmware_get_with_http_info( + async def index_virtuozzo_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -299391,10 +299391,10 @@ async def index_vmware_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"vmware\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination]: + """Return vulnerability data stored in index \"virtuozzo\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vmware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VMWare Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vmware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vmware?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the virtuozzo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Virtuozzo Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/virtuozzo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/virtuozzo?cursor=` :param page: set the page number of the response :type page: int @@ -299466,7 +299466,7 @@ async def index_vmware_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vmware_get_serialize( + _param = self._index_virtuozzo_get_serialize( page=page, limit=limit, cursor=cursor, @@ -299498,7 +299498,7 @@ async def index_vmware_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination", '404': "str", '500': "str", } @@ -299514,7 +299514,7 @@ async def index_vmware_get_with_http_info( @validate_call - async def index_vmware_get_without_preload_content( + async def index_virtuozzo_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -299553,9 +299553,9 @@ async def index_vmware_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"vmware\" + """Return vulnerability data stored in index \"virtuozzo\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vmware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VMWare Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vmware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vmware?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the virtuozzo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Virtuozzo Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/virtuozzo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/virtuozzo?cursor=` :param page: set the page number of the response :type page: int @@ -299627,7 +299627,7 @@ async def index_vmware_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vmware_get_serialize( + _param = self._index_virtuozzo_get_serialize( page=page, limit=limit, cursor=cursor, @@ -299659,7 +299659,7 @@ async def index_vmware_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination", '404': "str", '500': "str", } @@ -299670,7 +299670,7 @@ async def index_vmware_get_without_preload_content( return response_data.response - def _index_vmware_get_serialize( + def _index_virtuozzo_get_serialize( self, page, limit, @@ -299838,7 +299838,7 @@ def _index_vmware_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/vmware', + resource_path='/v3/index/virtuozzo', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -299855,7 +299855,7 @@ def _index_vmware_get_serialize( @validate_call - async def index_voidsec_get( + async def index_vlc_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -299893,10 +299893,10 @@ async def index_voidsec_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination: - """Return vulnerability data stored in index \"voidsec\" + ) -> RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination: + """Return vulnerability data stored in index \"vlc\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the voidsec index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VoidSec Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/voidsec?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/voidsec?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vlc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VLC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vlc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vlc?cursor=` :param page: set the page number of the response :type page: int @@ -299968,7 +299968,7 @@ async def index_voidsec_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_voidsec_get_serialize( + _param = self._index_vlc_get_serialize( page=page, limit=limit, cursor=cursor, @@ -300000,7 +300000,7 @@ async def index_voidsec_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination", '404': "str", '500': "str", } @@ -300016,7 +300016,7 @@ async def index_voidsec_get( @validate_call - async def index_voidsec_get_with_http_info( + async def index_vlc_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -300054,10 +300054,10 @@ async def index_voidsec_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination]: - """Return vulnerability data stored in index \"voidsec\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination]: + """Return vulnerability data stored in index \"vlc\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the voidsec index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VoidSec Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/voidsec?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/voidsec?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vlc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VLC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vlc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vlc?cursor=` :param page: set the page number of the response :type page: int @@ -300129,7 +300129,7 @@ async def index_voidsec_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_voidsec_get_serialize( + _param = self._index_vlc_get_serialize( page=page, limit=limit, cursor=cursor, @@ -300161,7 +300161,7 @@ async def index_voidsec_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination", '404': "str", '500': "str", } @@ -300177,7 +300177,7 @@ async def index_voidsec_get_with_http_info( @validate_call - async def index_voidsec_get_without_preload_content( + async def index_vlc_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -300216,9 +300216,9 @@ async def index_voidsec_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"voidsec\" + """Return vulnerability data stored in index \"vlc\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the voidsec index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VoidSec Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/voidsec?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/voidsec?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vlc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VLC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vlc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vlc?cursor=` :param page: set the page number of the response :type page: int @@ -300290,7 +300290,7 @@ async def index_voidsec_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_voidsec_get_serialize( + _param = self._index_vlc_get_serialize( page=page, limit=limit, cursor=cursor, @@ -300322,7 +300322,7 @@ async def index_voidsec_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination", '404': "str", '500': "str", } @@ -300333,7 +300333,7 @@ async def index_voidsec_get_without_preload_content( return response_data.response - def _index_voidsec_get_serialize( + def _index_vlc_get_serialize( self, page, limit, @@ -300501,7 +300501,7 @@ def _index_voidsec_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/voidsec', + resource_path='/v3/index/vlc', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -300518,7 +300518,7 @@ def _index_voidsec_get_serialize( @validate_call - async def index_vulncheck_canaries10d_get( + async def index_vmware_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -300527,10 +300527,16 @@ async def index_vulncheck_canaries10d_get( order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, + iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, + jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, + ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, + threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, + mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, + misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, + ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, + botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -300550,10 +300556,10 @@ async def index_vulncheck_canaries10d_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination: - """Return vulnerability data stored in index \"vulncheck-canaries-10d\" + ) -> RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"vmware\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-10d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (10 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-10d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-10d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vmware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VMWare Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vmware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vmware?cursor=` :param page: set the page number of the response :type page: int @@ -300569,14 +300575,26 @@ async def index_vulncheck_canaries10d_get( :type sort: str :param cve: Specify a CVE ID to search with. :type cve: str + :param alias: Specify a vulnerability alias to search with. + :type alias: str + :param iava: Specify an IAVA ID to search with. + :type iava: str + :param jvndb: Specify a JVNDB ID to search with. + :type jvndb: str + :param ilvn: Specify an ILVN ID to search with. + :type ilvn: str + :param threat_actor: Specify a threat actor name to search with. + :type threat_actor: str + :param mitre_id: Specify a MITRE ID to search with. + :type mitre_id: str + :param misp_id: Specify a MISP ID to search with. + :type misp_id: str + :param ransomware: Specify a ransomeware family name to search with. + :type ransomware: str + :param botnet: Specify a botnet name to search with. + :type botnet: str :param published: Specify a published date :type published: str - :param src_country: Country code in ISO-3166 format - :type src_country: str - :param dst_country: Country code in ISO-3166 format - :type dst_country: str - :param src_ip: Source IP address - :type src_ip: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -300613,7 +300631,7 @@ async def index_vulncheck_canaries10d_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_canaries10d_get_serialize( + _param = self._index_vmware_get_serialize( page=page, limit=limit, cursor=cursor, @@ -300621,10 +300639,16 @@ async def index_vulncheck_canaries10d_get( order=order, sort=sort, cve=cve, + alias=alias, + iava=iava, + jvndb=jvndb, + ilvn=ilvn, + threat_actor=threat_actor, + mitre_id=mitre_id, + misp_id=misp_id, + ransomware=ransomware, + botnet=botnet, published=published, - src_country=src_country, - dst_country=dst_country, - src_ip=src_ip, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -300639,7 +300663,7 @@ async def index_vulncheck_canaries10d_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -300655,7 +300679,7 @@ async def index_vulncheck_canaries10d_get( @validate_call - async def index_vulncheck_canaries10d_get_with_http_info( + async def index_vmware_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -300664,10 +300688,16 @@ async def index_vulncheck_canaries10d_get_with_http_info( order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, + iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, + jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, + ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, + threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, + mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, + misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, + ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, + botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -300687,10 +300717,10 @@ async def index_vulncheck_canaries10d_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination]: - """Return vulnerability data stored in index \"vulncheck-canaries-10d\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"vmware\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-10d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (10 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-10d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-10d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vmware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VMWare Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vmware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vmware?cursor=` :param page: set the page number of the response :type page: int @@ -300706,14 +300736,26 @@ async def index_vulncheck_canaries10d_get_with_http_info( :type sort: str :param cve: Specify a CVE ID to search with. :type cve: str + :param alias: Specify a vulnerability alias to search with. + :type alias: str + :param iava: Specify an IAVA ID to search with. + :type iava: str + :param jvndb: Specify a JVNDB ID to search with. + :type jvndb: str + :param ilvn: Specify an ILVN ID to search with. + :type ilvn: str + :param threat_actor: Specify a threat actor name to search with. + :type threat_actor: str + :param mitre_id: Specify a MITRE ID to search with. + :type mitre_id: str + :param misp_id: Specify a MISP ID to search with. + :type misp_id: str + :param ransomware: Specify a ransomeware family name to search with. + :type ransomware: str + :param botnet: Specify a botnet name to search with. + :type botnet: str :param published: Specify a published date :type published: str - :param src_country: Country code in ISO-3166 format - :type src_country: str - :param dst_country: Country code in ISO-3166 format - :type dst_country: str - :param src_ip: Source IP address - :type src_ip: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -300750,7 +300792,7 @@ async def index_vulncheck_canaries10d_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_canaries10d_get_serialize( + _param = self._index_vmware_get_serialize( page=page, limit=limit, cursor=cursor, @@ -300758,10 +300800,16 @@ async def index_vulncheck_canaries10d_get_with_http_info( order=order, sort=sort, cve=cve, + alias=alias, + iava=iava, + jvndb=jvndb, + ilvn=ilvn, + threat_actor=threat_actor, + mitre_id=mitre_id, + misp_id=misp_id, + ransomware=ransomware, + botnet=botnet, published=published, - src_country=src_country, - dst_country=dst_country, - src_ip=src_ip, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -300776,7 +300824,7 @@ async def index_vulncheck_canaries10d_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -300792,7 +300840,7 @@ async def index_vulncheck_canaries10d_get_with_http_info( @validate_call - async def index_vulncheck_canaries10d_get_without_preload_content( + async def index_vmware_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -300801,10 +300849,16 @@ async def index_vulncheck_canaries10d_get_without_preload_content( order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, + iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, + jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, + ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, + threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, + mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, + misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, + ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, + botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -300825,9 +300879,9 @@ async def index_vulncheck_canaries10d_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"vulncheck-canaries-10d\" + """Return vulnerability data stored in index \"vmware\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-10d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (10 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-10d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-10d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vmware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VMWare Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vmware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vmware?cursor=` :param page: set the page number of the response :type page: int @@ -300843,14 +300897,26 @@ async def index_vulncheck_canaries10d_get_without_preload_content( :type sort: str :param cve: Specify a CVE ID to search with. :type cve: str + :param alias: Specify a vulnerability alias to search with. + :type alias: str + :param iava: Specify an IAVA ID to search with. + :type iava: str + :param jvndb: Specify a JVNDB ID to search with. + :type jvndb: str + :param ilvn: Specify an ILVN ID to search with. + :type ilvn: str + :param threat_actor: Specify a threat actor name to search with. + :type threat_actor: str + :param mitre_id: Specify a MITRE ID to search with. + :type mitre_id: str + :param misp_id: Specify a MISP ID to search with. + :type misp_id: str + :param ransomware: Specify a ransomeware family name to search with. + :type ransomware: str + :param botnet: Specify a botnet name to search with. + :type botnet: str :param published: Specify a published date :type published: str - :param src_country: Country code in ISO-3166 format - :type src_country: str - :param dst_country: Country code in ISO-3166 format - :type dst_country: str - :param src_ip: Source IP address - :type src_ip: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -300887,7 +300953,7 @@ async def index_vulncheck_canaries10d_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_canaries10d_get_serialize( + _param = self._index_vmware_get_serialize( page=page, limit=limit, cursor=cursor, @@ -300895,10 +300961,16 @@ async def index_vulncheck_canaries10d_get_without_preload_content( order=order, sort=sort, cve=cve, + alias=alias, + iava=iava, + jvndb=jvndb, + ilvn=ilvn, + threat_actor=threat_actor, + mitre_id=mitre_id, + misp_id=misp_id, + ransomware=ransomware, + botnet=botnet, published=published, - src_country=src_country, - dst_country=dst_country, - src_ip=src_ip, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -300913,7 +300985,7 @@ async def index_vulncheck_canaries10d_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -300924,7 +300996,7 @@ async def index_vulncheck_canaries10d_get_without_preload_content( return response_data.response - def _index_vulncheck_canaries10d_get_serialize( + def _index_vmware_get_serialize( self, page, limit, @@ -300933,10 +301005,16 @@ def _index_vulncheck_canaries10d_get_serialize( order, sort, cve, + alias, + iava, + jvndb, + ilvn, + threat_actor, + mitre_id, + misp_id, + ransomware, + botnet, published, - src_country, - dst_country, - src_ip, date, updated_at_start_date, updated_at_end_date, @@ -300997,21 +301075,45 @@ def _index_vulncheck_canaries10d_get_serialize( _query_params.append(('cve', cve)) - if published is not None: + if alias is not None: - _query_params.append(('published', published)) + _query_params.append(('alias', alias)) - if src_country is not None: + if iava is not None: - _query_params.append(('src_country', src_country)) + _query_params.append(('iava', iava)) - if dst_country is not None: + if jvndb is not None: - _query_params.append(('dst_country', dst_country)) + _query_params.append(('jvndb', jvndb)) - if src_ip is not None: + if ilvn is not None: - _query_params.append(('src_ip', src_ip)) + _query_params.append(('ilvn', ilvn)) + + if threat_actor is not None: + + _query_params.append(('threat_actor', threat_actor)) + + if mitre_id is not None: + + _query_params.append(('mitre_id', mitre_id)) + + if misp_id is not None: + + _query_params.append(('misp_id', misp_id)) + + if ransomware is not None: + + _query_params.append(('ransomware', ransomware)) + + if botnet is not None: + + _query_params.append(('botnet', botnet)) + + if published is not None: + + _query_params.append(('published', published)) if date is not None: @@ -301062,7 +301164,7 @@ def _index_vulncheck_canaries10d_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/vulncheck-canaries-10d', + resource_path='/v3/index/vmware', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -301079,7 +301181,7 @@ def _index_vulncheck_canaries10d_get_serialize( @validate_call - async def index_vulncheck_canaries30d_get( + async def index_voidsec_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -301088,10 +301190,16 @@ async def index_vulncheck_canaries30d_get( order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, + iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, + jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, + ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, + threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, + mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, + misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, + ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, + botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -301111,10 +301219,10 @@ async def index_vulncheck_canaries30d_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination: - """Return vulnerability data stored in index \"vulncheck-canaries-30d\" + ) -> RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination: + """Return vulnerability data stored in index \"voidsec\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-30d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (30 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-30d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-30d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the voidsec index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VoidSec Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/voidsec?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/voidsec?cursor=` :param page: set the page number of the response :type page: int @@ -301130,14 +301238,26 @@ async def index_vulncheck_canaries30d_get( :type sort: str :param cve: Specify a CVE ID to search with. :type cve: str + :param alias: Specify a vulnerability alias to search with. + :type alias: str + :param iava: Specify an IAVA ID to search with. + :type iava: str + :param jvndb: Specify a JVNDB ID to search with. + :type jvndb: str + :param ilvn: Specify an ILVN ID to search with. + :type ilvn: str + :param threat_actor: Specify a threat actor name to search with. + :type threat_actor: str + :param mitre_id: Specify a MITRE ID to search with. + :type mitre_id: str + :param misp_id: Specify a MISP ID to search with. + :type misp_id: str + :param ransomware: Specify a ransomeware family name to search with. + :type ransomware: str + :param botnet: Specify a botnet name to search with. + :type botnet: str :param published: Specify a published date :type published: str - :param src_country: Country code in ISO-3166 format - :type src_country: str - :param dst_country: Country code in ISO-3166 format - :type dst_country: str - :param src_ip: Source IP address - :type src_ip: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -301174,7 +301294,7 @@ async def index_vulncheck_canaries30d_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_canaries30d_get_serialize( + _param = self._index_voidsec_get_serialize( page=page, limit=limit, cursor=cursor, @@ -301182,10 +301302,16 @@ async def index_vulncheck_canaries30d_get( order=order, sort=sort, cve=cve, + alias=alias, + iava=iava, + jvndb=jvndb, + ilvn=ilvn, + threat_actor=threat_actor, + mitre_id=mitre_id, + misp_id=misp_id, + ransomware=ransomware, + botnet=botnet, published=published, - src_country=src_country, - dst_country=dst_country, - src_ip=src_ip, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -301200,7 +301326,7 @@ async def index_vulncheck_canaries30d_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination", '404': "str", '500': "str", } @@ -301216,7 +301342,7 @@ async def index_vulncheck_canaries30d_get( @validate_call - async def index_vulncheck_canaries30d_get_with_http_info( + async def index_voidsec_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -301225,10 +301351,16 @@ async def index_vulncheck_canaries30d_get_with_http_info( order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, + iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, + jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, + ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, + threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, + mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, + misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, + ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, + botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -301248,10 +301380,10 @@ async def index_vulncheck_canaries30d_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination]: - """Return vulnerability data stored in index \"vulncheck-canaries-30d\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination]: + """Return vulnerability data stored in index \"voidsec\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-30d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (30 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-30d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-30d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the voidsec index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VoidSec Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/voidsec?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/voidsec?cursor=` :param page: set the page number of the response :type page: int @@ -301267,14 +301399,1091 @@ async def index_vulncheck_canaries30d_get_with_http_info( :type sort: str :param cve: Specify a CVE ID to search with. :type cve: str + :param alias: Specify a vulnerability alias to search with. + :type alias: str + :param iava: Specify an IAVA ID to search with. + :type iava: str + :param jvndb: Specify a JVNDB ID to search with. + :type jvndb: str + :param ilvn: Specify an ILVN ID to search with. + :type ilvn: str + :param threat_actor: Specify a threat actor name to search with. + :type threat_actor: str + :param mitre_id: Specify a MITRE ID to search with. + :type mitre_id: str + :param misp_id: Specify a MISP ID to search with. + :type misp_id: str + :param ransomware: Specify a ransomeware family name to search with. + :type ransomware: str + :param botnet: Specify a botnet name to search with. + :type botnet: str :param published: Specify a published date :type published: str - :param src_country: Country code in ISO-3166 format - :type src_country: str - :param dst_country: Country code in ISO-3166 format - :type dst_country: str - :param src_ip: Source IP address - :type src_ip: str + :param date: Specify an exact published date to filter with. + :type date: str + :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. + :type updated_at_start_date: str + :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. + :type updated_at_end_date: str + :param last_mod_start_date: Specify a starting last modified date to filter with. + :type last_mod_start_date: str + :param last_mod_end_date: Specify an ending last modified date to filter with. + :type last_mod_end_date: str + :param pub_start_date: Specify a starting published date to filter with. + :type pub_start_date: str + :param pub_end_date: Specify an ending published date to filter with. + :type pub_end_date: str + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._index_voidsec_get_serialize( + page=page, + limit=limit, + cursor=cursor, + start_cursor=start_cursor, + order=order, + sort=sort, + cve=cve, + alias=alias, + iava=iava, + jvndb=jvndb, + ilvn=ilvn, + threat_actor=threat_actor, + mitre_id=mitre_id, + misp_id=misp_id, + ransomware=ransomware, + botnet=botnet, + published=published, + date=date, + updated_at_start_date=updated_at_start_date, + updated_at_end_date=updated_at_end_date, + last_mod_start_date=last_mod_start_date, + last_mod_end_date=last_mod_end_date, + pub_start_date=pub_start_date, + pub_end_date=pub_end_date, + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination", + '404': "str", + '500': "str", + } + response_data = await self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + await response_data.read() + return self.api_client.response_deserialize( + response_data=response_data, + response_types_map=_response_types_map, + ) + + + @validate_call + async def index_voidsec_get_without_preload_content( + self, + page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, + limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, + cursor: Annotated[Optional[StrictStr], Field(description="continue server-side paging using a cursor id")] = None, + start_cursor: Annotated[Optional[StrictStr], Field(description="request server-side paging")] = None, + order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, + sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, + cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, + iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, + jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, + ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, + threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, + mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, + misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, + ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, + botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, + published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, + updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, + updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, + last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, + last_mod_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending last modified date to filter with.")] = None, + pub_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, + pub_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, + ) -> RESTResponseType: + """Return vulnerability data stored in index \"voidsec\" + + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the voidsec index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VoidSec Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/voidsec?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/voidsec?cursor=` + + :param page: set the page number of the response + :type page: int + :param limit: limit the number of findings in the response + :type limit: int + :param cursor: continue server-side paging using a cursor id + :type cursor: str + :param start_cursor: request server-side paging + :type start_cursor: str + :param order: direction of the sort + :type order: str + :param sort: field by which to sort the results + :type sort: str + :param cve: Specify a CVE ID to search with. + :type cve: str + :param alias: Specify a vulnerability alias to search with. + :type alias: str + :param iava: Specify an IAVA ID to search with. + :type iava: str + :param jvndb: Specify a JVNDB ID to search with. + :type jvndb: str + :param ilvn: Specify an ILVN ID to search with. + :type ilvn: str + :param threat_actor: Specify a threat actor name to search with. + :type threat_actor: str + :param mitre_id: Specify a MITRE ID to search with. + :type mitre_id: str + :param misp_id: Specify a MISP ID to search with. + :type misp_id: str + :param ransomware: Specify a ransomeware family name to search with. + :type ransomware: str + :param botnet: Specify a botnet name to search with. + :type botnet: str + :param published: Specify a published date + :type published: str + :param date: Specify an exact published date to filter with. + :type date: str + :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. + :type updated_at_start_date: str + :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. + :type updated_at_end_date: str + :param last_mod_start_date: Specify a starting last modified date to filter with. + :type last_mod_start_date: str + :param last_mod_end_date: Specify an ending last modified date to filter with. + :type last_mod_end_date: str + :param pub_start_date: Specify a starting published date to filter with. + :type pub_start_date: str + :param pub_end_date: Specify an ending published date to filter with. + :type pub_end_date: str + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._index_voidsec_get_serialize( + page=page, + limit=limit, + cursor=cursor, + start_cursor=start_cursor, + order=order, + sort=sort, + cve=cve, + alias=alias, + iava=iava, + jvndb=jvndb, + ilvn=ilvn, + threat_actor=threat_actor, + mitre_id=mitre_id, + misp_id=misp_id, + ransomware=ransomware, + botnet=botnet, + published=published, + date=date, + updated_at_start_date=updated_at_start_date, + updated_at_end_date=updated_at_end_date, + last_mod_start_date=last_mod_start_date, + last_mod_end_date=last_mod_end_date, + pub_start_date=pub_start_date, + pub_end_date=pub_end_date, + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination", + '404': "str", + '500': "str", + } + response_data = await self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + return response_data.response + + + def _index_voidsec_get_serialize( + self, + page, + limit, + cursor, + start_cursor, + order, + sort, + cve, + alias, + iava, + jvndb, + ilvn, + threat_actor, + mitre_id, + misp_id, + ransomware, + botnet, + published, + date, + updated_at_start_date, + updated_at_end_date, + last_mod_start_date, + last_mod_end_date, + pub_start_date, + pub_end_date, + _request_auth, + _content_type, + _headers, + _host_index, + ) -> RequestSerialized: + + _hosts = [ + 'https://api.vulncheck.com' + ] + _host = _hosts[_host_index] + + _collection_formats: Dict[str, str] = { + } + + _path_params: Dict[str, str] = {} + _query_params: List[Tuple[str, str]] = [] + _header_params: Dict[str, Optional[str]] = _headers or {} + _form_params: List[Tuple[str, str]] = [] + _files: Dict[ + str, Union[str, bytes, List[str], List[bytes], List[Tuple[str, bytes]]] + ] = {} + _body_params: Optional[bytes] = None + + # process the path parameters + # process the query parameters + if page is not None: + + _query_params.append(('page', page)) + + if limit is not None: + + _query_params.append(('limit', limit)) + + if cursor is not None: + + _query_params.append(('cursor', cursor)) + + if start_cursor is not None: + + _query_params.append(('start_cursor', start_cursor)) + + if order is not None: + + _query_params.append(('order', order)) + + if sort is not None: + + _query_params.append(('sort', sort)) + + if cve is not None: + + _query_params.append(('cve', cve)) + + if alias is not None: + + _query_params.append(('alias', alias)) + + if iava is not None: + + _query_params.append(('iava', iava)) + + if jvndb is not None: + + _query_params.append(('jvndb', jvndb)) + + if ilvn is not None: + + _query_params.append(('ilvn', ilvn)) + + if threat_actor is not None: + + _query_params.append(('threat_actor', threat_actor)) + + if mitre_id is not None: + + _query_params.append(('mitre_id', mitre_id)) + + if misp_id is not None: + + _query_params.append(('misp_id', misp_id)) + + if ransomware is not None: + + _query_params.append(('ransomware', ransomware)) + + if botnet is not None: + + _query_params.append(('botnet', botnet)) + + if published is not None: + + _query_params.append(('published', published)) + + if date is not None: + + _query_params.append(('date', date)) + + if updated_at_start_date is not None: + + _query_params.append(('updatedAtStartDate', updated_at_start_date)) + + if updated_at_end_date is not None: + + _query_params.append(('updatedAtEndDate', updated_at_end_date)) + + if last_mod_start_date is not None: + + _query_params.append(('lastModStartDate', last_mod_start_date)) + + if last_mod_end_date is not None: + + _query_params.append(('lastModEndDate', last_mod_end_date)) + + if pub_start_date is not None: + + _query_params.append(('pubStartDate', pub_start_date)) + + if pub_end_date is not None: + + _query_params.append(('pubEndDate', pub_end_date)) + + # process the header parameters + # process the form parameters + # process the body parameter + + + # set the HTTP header `Accept` + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( + [ + 'application/json' + ] + ) + + + # authentication setting + _auth_settings: List[str] = [ + 'Bearer' + ] + + return self.api_client.param_serialize( + method='GET', + resource_path='/v3/index/voidsec', + path_params=_path_params, + query_params=_query_params, + header_params=_header_params, + body=_body_params, + post_params=_form_params, + files=_files, + auth_settings=_auth_settings, + collection_formats=_collection_formats, + _host=_host, + _request_auth=_request_auth + ) + + + + + @validate_call + async def index_vulncheck_canaries10d_get( + self, + page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, + limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, + cursor: Annotated[Optional[StrictStr], Field(description="continue server-side paging using a cursor id")] = None, + start_cursor: Annotated[Optional[StrictStr], Field(description="request server-side paging")] = None, + order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, + sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, + cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, + src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, + dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + src_asn: Annotated[Optional[StrictStr], Field(description="Source ASN in format AS12345")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, + updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, + updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, + last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, + last_mod_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending last modified date to filter with.")] = None, + pub_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, + pub_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, + ) -> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination: + """Return vulnerability data stored in index \"vulncheck-canaries-10d\" + + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-10d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (10 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-10d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-10d?cursor=` + + :param page: set the page number of the response + :type page: int + :param limit: limit the number of findings in the response + :type limit: int + :param cursor: continue server-side paging using a cursor id + :type cursor: str + :param start_cursor: request server-side paging + :type start_cursor: str + :param order: direction of the sort + :type order: str + :param sort: field by which to sort the results + :type sort: str + :param cve: Specify a CVE ID to search with. + :type cve: str + :param published: Specify a published date + :type published: str + :param src_country: Country code in ISO-3166 format + :type src_country: str + :param dst_country: Country code in ISO-3166 format + :type dst_country: str + :param src_ip: Source IP address + :type src_ip: str + :param src_asn: Source ASN in format AS12345 + :type src_asn: str + :param date: Specify an exact published date to filter with. + :type date: str + :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. + :type updated_at_start_date: str + :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. + :type updated_at_end_date: str + :param last_mod_start_date: Specify a starting last modified date to filter with. + :type last_mod_start_date: str + :param last_mod_end_date: Specify an ending last modified date to filter with. + :type last_mod_end_date: str + :param pub_start_date: Specify a starting published date to filter with. + :type pub_start_date: str + :param pub_end_date: Specify an ending published date to filter with. + :type pub_end_date: str + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._index_vulncheck_canaries10d_get_serialize( + page=page, + limit=limit, + cursor=cursor, + start_cursor=start_cursor, + order=order, + sort=sort, + cve=cve, + published=published, + src_country=src_country, + dst_country=dst_country, + src_ip=src_ip, + src_asn=src_asn, + date=date, + updated_at_start_date=updated_at_start_date, + updated_at_end_date=updated_at_end_date, + last_mod_start_date=last_mod_start_date, + last_mod_end_date=last_mod_end_date, + pub_start_date=pub_start_date, + pub_end_date=pub_end_date, + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination", + '404': "str", + '500': "str", + } + response_data = await self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + await response_data.read() + return self.api_client.response_deserialize( + response_data=response_data, + response_types_map=_response_types_map, + ).data + + + @validate_call + async def index_vulncheck_canaries10d_get_with_http_info( + self, + page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, + limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, + cursor: Annotated[Optional[StrictStr], Field(description="continue server-side paging using a cursor id")] = None, + start_cursor: Annotated[Optional[StrictStr], Field(description="request server-side paging")] = None, + order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, + sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, + cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, + src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, + dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + src_asn: Annotated[Optional[StrictStr], Field(description="Source ASN in format AS12345")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, + updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, + updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, + last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, + last_mod_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending last modified date to filter with.")] = None, + pub_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, + pub_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, + ) -> ApiResponse[RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination]: + """Return vulnerability data stored in index \"vulncheck-canaries-10d\" + + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-10d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (10 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-10d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-10d?cursor=` + + :param page: set the page number of the response + :type page: int + :param limit: limit the number of findings in the response + :type limit: int + :param cursor: continue server-side paging using a cursor id + :type cursor: str + :param start_cursor: request server-side paging + :type start_cursor: str + :param order: direction of the sort + :type order: str + :param sort: field by which to sort the results + :type sort: str + :param cve: Specify a CVE ID to search with. + :type cve: str + :param published: Specify a published date + :type published: str + :param src_country: Country code in ISO-3166 format + :type src_country: str + :param dst_country: Country code in ISO-3166 format + :type dst_country: str + :param src_ip: Source IP address + :type src_ip: str + :param src_asn: Source ASN in format AS12345 + :type src_asn: str + :param date: Specify an exact published date to filter with. + :type date: str + :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. + :type updated_at_start_date: str + :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. + :type updated_at_end_date: str + :param last_mod_start_date: Specify a starting last modified date to filter with. + :type last_mod_start_date: str + :param last_mod_end_date: Specify an ending last modified date to filter with. + :type last_mod_end_date: str + :param pub_start_date: Specify a starting published date to filter with. + :type pub_start_date: str + :param pub_end_date: Specify an ending published date to filter with. + :type pub_end_date: str + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._index_vulncheck_canaries10d_get_serialize( + page=page, + limit=limit, + cursor=cursor, + start_cursor=start_cursor, + order=order, + sort=sort, + cve=cve, + published=published, + src_country=src_country, + dst_country=dst_country, + src_ip=src_ip, + src_asn=src_asn, + date=date, + updated_at_start_date=updated_at_start_date, + updated_at_end_date=updated_at_end_date, + last_mod_start_date=last_mod_start_date, + last_mod_end_date=last_mod_end_date, + pub_start_date=pub_start_date, + pub_end_date=pub_end_date, + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination", + '404': "str", + '500': "str", + } + response_data = await self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + await response_data.read() + return self.api_client.response_deserialize( + response_data=response_data, + response_types_map=_response_types_map, + ) + + + @validate_call + async def index_vulncheck_canaries10d_get_without_preload_content( + self, + page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, + limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, + cursor: Annotated[Optional[StrictStr], Field(description="continue server-side paging using a cursor id")] = None, + start_cursor: Annotated[Optional[StrictStr], Field(description="request server-side paging")] = None, + order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, + sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, + cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, + src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, + dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + src_asn: Annotated[Optional[StrictStr], Field(description="Source ASN in format AS12345")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, + updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, + updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, + last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, + last_mod_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending last modified date to filter with.")] = None, + pub_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, + pub_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, + ) -> RESTResponseType: + """Return vulnerability data stored in index \"vulncheck-canaries-10d\" + + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-10d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (10 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-10d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-10d?cursor=` + + :param page: set the page number of the response + :type page: int + :param limit: limit the number of findings in the response + :type limit: int + :param cursor: continue server-side paging using a cursor id + :type cursor: str + :param start_cursor: request server-side paging + :type start_cursor: str + :param order: direction of the sort + :type order: str + :param sort: field by which to sort the results + :type sort: str + :param cve: Specify a CVE ID to search with. + :type cve: str + :param published: Specify a published date + :type published: str + :param src_country: Country code in ISO-3166 format + :type src_country: str + :param dst_country: Country code in ISO-3166 format + :type dst_country: str + :param src_ip: Source IP address + :type src_ip: str + :param src_asn: Source ASN in format AS12345 + :type src_asn: str + :param date: Specify an exact published date to filter with. + :type date: str + :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. + :type updated_at_start_date: str + :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. + :type updated_at_end_date: str + :param last_mod_start_date: Specify a starting last modified date to filter with. + :type last_mod_start_date: str + :param last_mod_end_date: Specify an ending last modified date to filter with. + :type last_mod_end_date: str + :param pub_start_date: Specify a starting published date to filter with. + :type pub_start_date: str + :param pub_end_date: Specify an ending published date to filter with. + :type pub_end_date: str + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._index_vulncheck_canaries10d_get_serialize( + page=page, + limit=limit, + cursor=cursor, + start_cursor=start_cursor, + order=order, + sort=sort, + cve=cve, + published=published, + src_country=src_country, + dst_country=dst_country, + src_ip=src_ip, + src_asn=src_asn, + date=date, + updated_at_start_date=updated_at_start_date, + updated_at_end_date=updated_at_end_date, + last_mod_start_date=last_mod_start_date, + last_mod_end_date=last_mod_end_date, + pub_start_date=pub_start_date, + pub_end_date=pub_end_date, + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination", + '404': "str", + '500': "str", + } + response_data = await self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + return response_data.response + + + def _index_vulncheck_canaries10d_get_serialize( + self, + page, + limit, + cursor, + start_cursor, + order, + sort, + cve, + published, + src_country, + dst_country, + src_ip, + src_asn, + date, + updated_at_start_date, + updated_at_end_date, + last_mod_start_date, + last_mod_end_date, + pub_start_date, + pub_end_date, + _request_auth, + _content_type, + _headers, + _host_index, + ) -> RequestSerialized: + + _hosts = [ + 'https://api.vulncheck.com' + ] + _host = _hosts[_host_index] + + _collection_formats: Dict[str, str] = { + } + + _path_params: Dict[str, str] = {} + _query_params: List[Tuple[str, str]] = [] + _header_params: Dict[str, Optional[str]] = _headers or {} + _form_params: List[Tuple[str, str]] = [] + _files: Dict[ + str, Union[str, bytes, List[str], List[bytes], List[Tuple[str, bytes]]] + ] = {} + _body_params: Optional[bytes] = None + + # process the path parameters + # process the query parameters + if page is not None: + + _query_params.append(('page', page)) + + if limit is not None: + + _query_params.append(('limit', limit)) + + if cursor is not None: + + _query_params.append(('cursor', cursor)) + + if start_cursor is not None: + + _query_params.append(('start_cursor', start_cursor)) + + if order is not None: + + _query_params.append(('order', order)) + + if sort is not None: + + _query_params.append(('sort', sort)) + + if cve is not None: + + _query_params.append(('cve', cve)) + + if published is not None: + + _query_params.append(('published', published)) + + if src_country is not None: + + _query_params.append(('src_country', src_country)) + + if dst_country is not None: + + _query_params.append(('dst_country', dst_country)) + + if src_ip is not None: + + _query_params.append(('src_ip', src_ip)) + + if src_asn is not None: + + _query_params.append(('src_asn', src_asn)) + + if date is not None: + + _query_params.append(('date', date)) + + if updated_at_start_date is not None: + + _query_params.append(('updatedAtStartDate', updated_at_start_date)) + + if updated_at_end_date is not None: + + _query_params.append(('updatedAtEndDate', updated_at_end_date)) + + if last_mod_start_date is not None: + + _query_params.append(('lastModStartDate', last_mod_start_date)) + + if last_mod_end_date is not None: + + _query_params.append(('lastModEndDate', last_mod_end_date)) + + if pub_start_date is not None: + + _query_params.append(('pubStartDate', pub_start_date)) + + if pub_end_date is not None: + + _query_params.append(('pubEndDate', pub_end_date)) + + # process the header parameters + # process the form parameters + # process the body parameter + + + # set the HTTP header `Accept` + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( + [ + 'application/json' + ] + ) + + + # authentication setting + _auth_settings: List[str] = [ + 'Bearer' + ] + + return self.api_client.param_serialize( + method='GET', + resource_path='/v3/index/vulncheck-canaries-10d', + path_params=_path_params, + query_params=_query_params, + header_params=_header_params, + body=_body_params, + post_params=_form_params, + files=_files, + auth_settings=_auth_settings, + collection_formats=_collection_formats, + _host=_host, + _request_auth=_request_auth + ) + + + + + @validate_call + async def index_vulncheck_canaries30d_get( + self, + page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, + limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, + cursor: Annotated[Optional[StrictStr], Field(description="continue server-side paging using a cursor id")] = None, + start_cursor: Annotated[Optional[StrictStr], Field(description="request server-side paging")] = None, + order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, + sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, + cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, + src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, + dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + src_asn: Annotated[Optional[StrictStr], Field(description="Source ASN in format AS12345")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, + updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, + updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, + last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, + last_mod_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending last modified date to filter with.")] = None, + pub_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, + pub_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, + ) -> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination: + """Return vulnerability data stored in index \"vulncheck-canaries-30d\" + + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-30d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (30 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-30d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-30d?cursor=` + + :param page: set the page number of the response + :type page: int + :param limit: limit the number of findings in the response + :type limit: int + :param cursor: continue server-side paging using a cursor id + :type cursor: str + :param start_cursor: request server-side paging + :type start_cursor: str + :param order: direction of the sort + :type order: str + :param sort: field by which to sort the results + :type sort: str + :param cve: Specify a CVE ID to search with. + :type cve: str + :param published: Specify a published date + :type published: str + :param src_country: Country code in ISO-3166 format + :type src_country: str + :param dst_country: Country code in ISO-3166 format + :type dst_country: str + :param src_ip: Source IP address + :type src_ip: str + :param src_asn: Source ASN in format AS12345 + :type src_asn: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -301323,6 +302532,148 @@ async def index_vulncheck_canaries30d_get_with_http_info( src_country=src_country, dst_country=dst_country, src_ip=src_ip, + src_asn=src_asn, + date=date, + updated_at_start_date=updated_at_start_date, + updated_at_end_date=updated_at_end_date, + last_mod_start_date=last_mod_start_date, + last_mod_end_date=last_mod_end_date, + pub_start_date=pub_start_date, + pub_end_date=pub_end_date, + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination", + '404': "str", + '500': "str", + } + response_data = await self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + await response_data.read() + return self.api_client.response_deserialize( + response_data=response_data, + response_types_map=_response_types_map, + ).data + + + @validate_call + async def index_vulncheck_canaries30d_get_with_http_info( + self, + page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, + limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, + cursor: Annotated[Optional[StrictStr], Field(description="continue server-side paging using a cursor id")] = None, + start_cursor: Annotated[Optional[StrictStr], Field(description="request server-side paging")] = None, + order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, + sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, + cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, + src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, + dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + src_asn: Annotated[Optional[StrictStr], Field(description="Source ASN in format AS12345")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, + updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, + updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, + last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, + last_mod_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending last modified date to filter with.")] = None, + pub_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, + pub_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, + ) -> ApiResponse[RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination]: + """Return vulnerability data stored in index \"vulncheck-canaries-30d\" + + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-30d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (30 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-30d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-30d?cursor=` + + :param page: set the page number of the response + :type page: int + :param limit: limit the number of findings in the response + :type limit: int + :param cursor: continue server-side paging using a cursor id + :type cursor: str + :param start_cursor: request server-side paging + :type start_cursor: str + :param order: direction of the sort + :type order: str + :param sort: field by which to sort the results + :type sort: str + :param cve: Specify a CVE ID to search with. + :type cve: str + :param published: Specify a published date + :type published: str + :param src_country: Country code in ISO-3166 format + :type src_country: str + :param dst_country: Country code in ISO-3166 format + :type dst_country: str + :param src_ip: Source IP address + :type src_ip: str + :param src_asn: Source ASN in format AS12345 + :type src_asn: str + :param date: Specify an exact published date to filter with. + :type date: str + :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. + :type updated_at_start_date: str + :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. + :type updated_at_end_date: str + :param last_mod_start_date: Specify a starting last modified date to filter with. + :type last_mod_start_date: str + :param last_mod_end_date: Specify an ending last modified date to filter with. + :type last_mod_end_date: str + :param pub_start_date: Specify a starting published date to filter with. + :type pub_start_date: str + :param pub_end_date: Specify an ending published date to filter with. + :type pub_end_date: str + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._index_vulncheck_canaries30d_get_serialize( + page=page, + limit=limit, + cursor=cursor, + start_cursor=start_cursor, + order=order, + sort=sort, + cve=cve, + published=published, + src_country=src_country, + dst_country=dst_country, + src_ip=src_ip, + src_asn=src_asn, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -301366,6 +302717,7 @@ async def index_vulncheck_canaries30d_get_without_preload_content( src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + src_asn: Annotated[Optional[StrictStr], Field(description="Source ASN in format AS12345")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -301412,6 +302764,8 @@ async def index_vulncheck_canaries30d_get_without_preload_content( :type dst_country: str :param src_ip: Source IP address :type src_ip: str + :param src_asn: Source ASN in format AS12345 + :type src_asn: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -301460,6 +302814,7 @@ async def index_vulncheck_canaries30d_get_without_preload_content( src_country=src_country, dst_country=dst_country, src_ip=src_ip, + src_asn=src_asn, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -301498,6 +302853,585 @@ def _index_vulncheck_canaries30d_get_serialize( src_country, dst_country, src_ip, + src_asn, + date, + updated_at_start_date, + updated_at_end_date, + last_mod_start_date, + last_mod_end_date, + pub_start_date, + pub_end_date, + _request_auth, + _content_type, + _headers, + _host_index, + ) -> RequestSerialized: + + _hosts = [ + 'https://api.vulncheck.com' + ] + _host = _hosts[_host_index] + + _collection_formats: Dict[str, str] = { + } + + _path_params: Dict[str, str] = {} + _query_params: List[Tuple[str, str]] = [] + _header_params: Dict[str, Optional[str]] = _headers or {} + _form_params: List[Tuple[str, str]] = [] + _files: Dict[ + str, Union[str, bytes, List[str], List[bytes], List[Tuple[str, bytes]]] + ] = {} + _body_params: Optional[bytes] = None + + # process the path parameters + # process the query parameters + if page is not None: + + _query_params.append(('page', page)) + + if limit is not None: + + _query_params.append(('limit', limit)) + + if cursor is not None: + + _query_params.append(('cursor', cursor)) + + if start_cursor is not None: + + _query_params.append(('start_cursor', start_cursor)) + + if order is not None: + + _query_params.append(('order', order)) + + if sort is not None: + + _query_params.append(('sort', sort)) + + if cve is not None: + + _query_params.append(('cve', cve)) + + if published is not None: + + _query_params.append(('published', published)) + + if src_country is not None: + + _query_params.append(('src_country', src_country)) + + if dst_country is not None: + + _query_params.append(('dst_country', dst_country)) + + if src_ip is not None: + + _query_params.append(('src_ip', src_ip)) + + if src_asn is not None: + + _query_params.append(('src_asn', src_asn)) + + if date is not None: + + _query_params.append(('date', date)) + + if updated_at_start_date is not None: + + _query_params.append(('updatedAtStartDate', updated_at_start_date)) + + if updated_at_end_date is not None: + + _query_params.append(('updatedAtEndDate', updated_at_end_date)) + + if last_mod_start_date is not None: + + _query_params.append(('lastModStartDate', last_mod_start_date)) + + if last_mod_end_date is not None: + + _query_params.append(('lastModEndDate', last_mod_end_date)) + + if pub_start_date is not None: + + _query_params.append(('pubStartDate', pub_start_date)) + + if pub_end_date is not None: + + _query_params.append(('pubEndDate', pub_end_date)) + + # process the header parameters + # process the form parameters + # process the body parameter + + + # set the HTTP header `Accept` + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( + [ + 'application/json' + ] + ) + + + # authentication setting + _auth_settings: List[str] = [ + 'Bearer' + ] + + return self.api_client.param_serialize( + method='GET', + resource_path='/v3/index/vulncheck-canaries-30d', + path_params=_path_params, + query_params=_query_params, + header_params=_header_params, + body=_body_params, + post_params=_form_params, + files=_files, + auth_settings=_auth_settings, + collection_formats=_collection_formats, + _host=_host, + _request_auth=_request_auth + ) + + + + + @validate_call + async def index_vulncheck_canaries3d_get( + self, + page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, + limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, + cursor: Annotated[Optional[StrictStr], Field(description="continue server-side paging using a cursor id")] = None, + start_cursor: Annotated[Optional[StrictStr], Field(description="request server-side paging")] = None, + order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, + sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, + cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, + src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, + dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + src_asn: Annotated[Optional[StrictStr], Field(description="Source ASN in format AS12345")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, + updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, + updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, + last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, + last_mod_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending last modified date to filter with.")] = None, + pub_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, + pub_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, + ) -> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination: + """Return vulnerability data stored in index \"vulncheck-canaries-3d\" + + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-3d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (3 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-3d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-3d?cursor=` + + :param page: set the page number of the response + :type page: int + :param limit: limit the number of findings in the response + :type limit: int + :param cursor: continue server-side paging using a cursor id + :type cursor: str + :param start_cursor: request server-side paging + :type start_cursor: str + :param order: direction of the sort + :type order: str + :param sort: field by which to sort the results + :type sort: str + :param cve: Specify a CVE ID to search with. + :type cve: str + :param published: Specify a published date + :type published: str + :param src_country: Country code in ISO-3166 format + :type src_country: str + :param dst_country: Country code in ISO-3166 format + :type dst_country: str + :param src_ip: Source IP address + :type src_ip: str + :param src_asn: Source ASN in format AS12345 + :type src_asn: str + :param date: Specify an exact published date to filter with. + :type date: str + :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. + :type updated_at_start_date: str + :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. + :type updated_at_end_date: str + :param last_mod_start_date: Specify a starting last modified date to filter with. + :type last_mod_start_date: str + :param last_mod_end_date: Specify an ending last modified date to filter with. + :type last_mod_end_date: str + :param pub_start_date: Specify a starting published date to filter with. + :type pub_start_date: str + :param pub_end_date: Specify an ending published date to filter with. + :type pub_end_date: str + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._index_vulncheck_canaries3d_get_serialize( + page=page, + limit=limit, + cursor=cursor, + start_cursor=start_cursor, + order=order, + sort=sort, + cve=cve, + published=published, + src_country=src_country, + dst_country=dst_country, + src_ip=src_ip, + src_asn=src_asn, + date=date, + updated_at_start_date=updated_at_start_date, + updated_at_end_date=updated_at_end_date, + last_mod_start_date=last_mod_start_date, + last_mod_end_date=last_mod_end_date, + pub_start_date=pub_start_date, + pub_end_date=pub_end_date, + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination", + '404': "str", + '500': "str", + } + response_data = await self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + await response_data.read() + return self.api_client.response_deserialize( + response_data=response_data, + response_types_map=_response_types_map, + ).data + + + @validate_call + async def index_vulncheck_canaries3d_get_with_http_info( + self, + page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, + limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, + cursor: Annotated[Optional[StrictStr], Field(description="continue server-side paging using a cursor id")] = None, + start_cursor: Annotated[Optional[StrictStr], Field(description="request server-side paging")] = None, + order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, + sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, + cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, + src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, + dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + src_asn: Annotated[Optional[StrictStr], Field(description="Source ASN in format AS12345")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, + updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, + updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, + last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, + last_mod_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending last modified date to filter with.")] = None, + pub_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, + pub_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, + ) -> ApiResponse[RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination]: + """Return vulnerability data stored in index \"vulncheck-canaries-3d\" + + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-3d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (3 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-3d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-3d?cursor=` + + :param page: set the page number of the response + :type page: int + :param limit: limit the number of findings in the response + :type limit: int + :param cursor: continue server-side paging using a cursor id + :type cursor: str + :param start_cursor: request server-side paging + :type start_cursor: str + :param order: direction of the sort + :type order: str + :param sort: field by which to sort the results + :type sort: str + :param cve: Specify a CVE ID to search with. + :type cve: str + :param published: Specify a published date + :type published: str + :param src_country: Country code in ISO-3166 format + :type src_country: str + :param dst_country: Country code in ISO-3166 format + :type dst_country: str + :param src_ip: Source IP address + :type src_ip: str + :param src_asn: Source ASN in format AS12345 + :type src_asn: str + :param date: Specify an exact published date to filter with. + :type date: str + :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. + :type updated_at_start_date: str + :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. + :type updated_at_end_date: str + :param last_mod_start_date: Specify a starting last modified date to filter with. + :type last_mod_start_date: str + :param last_mod_end_date: Specify an ending last modified date to filter with. + :type last_mod_end_date: str + :param pub_start_date: Specify a starting published date to filter with. + :type pub_start_date: str + :param pub_end_date: Specify an ending published date to filter with. + :type pub_end_date: str + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._index_vulncheck_canaries3d_get_serialize( + page=page, + limit=limit, + cursor=cursor, + start_cursor=start_cursor, + order=order, + sort=sort, + cve=cve, + published=published, + src_country=src_country, + dst_country=dst_country, + src_ip=src_ip, + src_asn=src_asn, + date=date, + updated_at_start_date=updated_at_start_date, + updated_at_end_date=updated_at_end_date, + last_mod_start_date=last_mod_start_date, + last_mod_end_date=last_mod_end_date, + pub_start_date=pub_start_date, + pub_end_date=pub_end_date, + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination", + '404': "str", + '500': "str", + } + response_data = await self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + await response_data.read() + return self.api_client.response_deserialize( + response_data=response_data, + response_types_map=_response_types_map, + ) + + + @validate_call + async def index_vulncheck_canaries3d_get_without_preload_content( + self, + page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, + limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, + cursor: Annotated[Optional[StrictStr], Field(description="continue server-side paging using a cursor id")] = None, + start_cursor: Annotated[Optional[StrictStr], Field(description="request server-side paging")] = None, + order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, + sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, + cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, + src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, + dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + src_asn: Annotated[Optional[StrictStr], Field(description="Source ASN in format AS12345")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, + updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, + updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, + last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, + last_mod_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending last modified date to filter with.")] = None, + pub_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, + pub_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, + ) -> RESTResponseType: + """Return vulnerability data stored in index \"vulncheck-canaries-3d\" + + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-3d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (3 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-3d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-3d?cursor=` + + :param page: set the page number of the response + :type page: int + :param limit: limit the number of findings in the response + :type limit: int + :param cursor: continue server-side paging using a cursor id + :type cursor: str + :param start_cursor: request server-side paging + :type start_cursor: str + :param order: direction of the sort + :type order: str + :param sort: field by which to sort the results + :type sort: str + :param cve: Specify a CVE ID to search with. + :type cve: str + :param published: Specify a published date + :type published: str + :param src_country: Country code in ISO-3166 format + :type src_country: str + :param dst_country: Country code in ISO-3166 format + :type dst_country: str + :param src_ip: Source IP address + :type src_ip: str + :param src_asn: Source ASN in format AS12345 + :type src_asn: str + :param date: Specify an exact published date to filter with. + :type date: str + :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. + :type updated_at_start_date: str + :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. + :type updated_at_end_date: str + :param last_mod_start_date: Specify a starting last modified date to filter with. + :type last_mod_start_date: str + :param last_mod_end_date: Specify an ending last modified date to filter with. + :type last_mod_end_date: str + :param pub_start_date: Specify a starting published date to filter with. + :type pub_start_date: str + :param pub_end_date: Specify an ending published date to filter with. + :type pub_end_date: str + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._index_vulncheck_canaries3d_get_serialize( + page=page, + limit=limit, + cursor=cursor, + start_cursor=start_cursor, + order=order, + sort=sort, + cve=cve, + published=published, + src_country=src_country, + dst_country=dst_country, + src_ip=src_ip, + src_asn=src_asn, + date=date, + updated_at_start_date=updated_at_start_date, + updated_at_end_date=updated_at_end_date, + last_mod_start_date=last_mod_start_date, + last_mod_end_date=last_mod_end_date, + pub_start_date=pub_start_date, + pub_end_date=pub_end_date, + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination", + '404': "str", + '500': "str", + } + response_data = await self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + return response_data.response + + + def _index_vulncheck_canaries3d_get_serialize( + self, + page, + limit, + cursor, + start_cursor, + order, + sort, + cve, + published, + src_country, + dst_country, + src_ip, + src_asn, date, updated_at_start_date, updated_at_end_date, @@ -301574,566 +303508,9 @@ def _index_vulncheck_canaries30d_get_serialize( _query_params.append(('src_ip', src_ip)) - if date is not None: - - _query_params.append(('date', date)) - - if updated_at_start_date is not None: - - _query_params.append(('updatedAtStartDate', updated_at_start_date)) - - if updated_at_end_date is not None: - - _query_params.append(('updatedAtEndDate', updated_at_end_date)) - - if last_mod_start_date is not None: - - _query_params.append(('lastModStartDate', last_mod_start_date)) - - if last_mod_end_date is not None: - - _query_params.append(('lastModEndDate', last_mod_end_date)) + if src_asn is not None: - if pub_start_date is not None: - - _query_params.append(('pubStartDate', pub_start_date)) - - if pub_end_date is not None: - - _query_params.append(('pubEndDate', pub_end_date)) - - # process the header parameters - # process the form parameters - # process the body parameter - - - # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( - [ - 'application/json' - ] - ) - - - # authentication setting - _auth_settings: List[str] = [ - 'Bearer' - ] - - return self.api_client.param_serialize( - method='GET', - resource_path='/v3/index/vulncheck-canaries-30d', - path_params=_path_params, - query_params=_query_params, - header_params=_header_params, - body=_body_params, - post_params=_form_params, - files=_files, - auth_settings=_auth_settings, - collection_formats=_collection_formats, - _host=_host, - _request_auth=_request_auth - ) - - - - - @validate_call - async def index_vulncheck_canaries3d_get( - self, - page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, - limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, - cursor: Annotated[Optional[StrictStr], Field(description="continue server-side paging using a cursor id")] = None, - start_cursor: Annotated[Optional[StrictStr], Field(description="request server-side paging")] = None, - order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, - sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, - cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, - published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, - date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, - updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, - updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, - last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, - last_mod_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending last modified date to filter with.")] = None, - pub_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - pub_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, - _request_timeout: Union[ - None, - Annotated[StrictFloat, Field(gt=0)], - Tuple[ - Annotated[StrictFloat, Field(gt=0)], - Annotated[StrictFloat, Field(gt=0)] - ] - ] = None, - _request_auth: Optional[Dict[StrictStr, Any]] = None, - _content_type: Optional[StrictStr] = None, - _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination: - """Return vulnerability data stored in index \"vulncheck-canaries-3d\" - - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-3d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (3 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-3d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-3d?cursor=` - - :param page: set the page number of the response - :type page: int - :param limit: limit the number of findings in the response - :type limit: int - :param cursor: continue server-side paging using a cursor id - :type cursor: str - :param start_cursor: request server-side paging - :type start_cursor: str - :param order: direction of the sort - :type order: str - :param sort: field by which to sort the results - :type sort: str - :param cve: Specify a CVE ID to search with. - :type cve: str - :param published: Specify a published date - :type published: str - :param src_country: Country code in ISO-3166 format - :type src_country: str - :param dst_country: Country code in ISO-3166 format - :type dst_country: str - :param src_ip: Source IP address - :type src_ip: str - :param date: Specify an exact published date to filter with. - :type date: str - :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. - :type updated_at_start_date: str - :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. - :type updated_at_end_date: str - :param last_mod_start_date: Specify a starting last modified date to filter with. - :type last_mod_start_date: str - :param last_mod_end_date: Specify an ending last modified date to filter with. - :type last_mod_end_date: str - :param pub_start_date: Specify a starting published date to filter with. - :type pub_start_date: str - :param pub_end_date: Specify an ending published date to filter with. - :type pub_end_date: str - :param _request_timeout: timeout setting for this request. If one - number provided, it will be total request - timeout. It can also be a pair (tuple) of - (connection, read) timeouts. - :type _request_timeout: int, tuple(int, int), optional - :param _request_auth: set to override the auth_settings for an a single - request; this effectively ignores the - authentication in the spec for a single request. - :type _request_auth: dict, optional - :param _content_type: force content-type for the request. - :type _content_type: str, Optional - :param _headers: set to override the headers for a single - request; this effectively ignores the headers - in the spec for a single request. - :type _headers: dict, optional - :param _host_index: set to override the host_index for a single - request; this effectively ignores the host_index - in the spec for a single request. - :type _host_index: int, optional - :return: Returns the result object. - """ # noqa: E501 - - _param = self._index_vulncheck_canaries3d_get_serialize( - page=page, - limit=limit, - cursor=cursor, - start_cursor=start_cursor, - order=order, - sort=sort, - cve=cve, - published=published, - src_country=src_country, - dst_country=dst_country, - src_ip=src_ip, - date=date, - updated_at_start_date=updated_at_start_date, - updated_at_end_date=updated_at_end_date, - last_mod_start_date=last_mod_start_date, - last_mod_end_date=last_mod_end_date, - pub_start_date=pub_start_date, - pub_end_date=pub_end_date, - _request_auth=_request_auth, - _content_type=_content_type, - _headers=_headers, - _host_index=_host_index - ) - - _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination", - '404': "str", - '500': "str", - } - response_data = await self.api_client.call_api( - *_param, - _request_timeout=_request_timeout - ) - await response_data.read() - return self.api_client.response_deserialize( - response_data=response_data, - response_types_map=_response_types_map, - ).data - - - @validate_call - async def index_vulncheck_canaries3d_get_with_http_info( - self, - page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, - limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, - cursor: Annotated[Optional[StrictStr], Field(description="continue server-side paging using a cursor id")] = None, - start_cursor: Annotated[Optional[StrictStr], Field(description="request server-side paging")] = None, - order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, - sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, - cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, - published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, - date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, - updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, - updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, - last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, - last_mod_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending last modified date to filter with.")] = None, - pub_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - pub_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, - _request_timeout: Union[ - None, - Annotated[StrictFloat, Field(gt=0)], - Tuple[ - Annotated[StrictFloat, Field(gt=0)], - Annotated[StrictFloat, Field(gt=0)] - ] - ] = None, - _request_auth: Optional[Dict[StrictStr, Any]] = None, - _content_type: Optional[StrictStr] = None, - _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination]: - """Return vulnerability data stored in index \"vulncheck-canaries-3d\" - - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-3d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (3 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-3d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-3d?cursor=` - - :param page: set the page number of the response - :type page: int - :param limit: limit the number of findings in the response - :type limit: int - :param cursor: continue server-side paging using a cursor id - :type cursor: str - :param start_cursor: request server-side paging - :type start_cursor: str - :param order: direction of the sort - :type order: str - :param sort: field by which to sort the results - :type sort: str - :param cve: Specify a CVE ID to search with. - :type cve: str - :param published: Specify a published date - :type published: str - :param src_country: Country code in ISO-3166 format - :type src_country: str - :param dst_country: Country code in ISO-3166 format - :type dst_country: str - :param src_ip: Source IP address - :type src_ip: str - :param date: Specify an exact published date to filter with. - :type date: str - :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. - :type updated_at_start_date: str - :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. - :type updated_at_end_date: str - :param last_mod_start_date: Specify a starting last modified date to filter with. - :type last_mod_start_date: str - :param last_mod_end_date: Specify an ending last modified date to filter with. - :type last_mod_end_date: str - :param pub_start_date: Specify a starting published date to filter with. - :type pub_start_date: str - :param pub_end_date: Specify an ending published date to filter with. - :type pub_end_date: str - :param _request_timeout: timeout setting for this request. If one - number provided, it will be total request - timeout. It can also be a pair (tuple) of - (connection, read) timeouts. - :type _request_timeout: int, tuple(int, int), optional - :param _request_auth: set to override the auth_settings for an a single - request; this effectively ignores the - authentication in the spec for a single request. - :type _request_auth: dict, optional - :param _content_type: force content-type for the request. - :type _content_type: str, Optional - :param _headers: set to override the headers for a single - request; this effectively ignores the headers - in the spec for a single request. - :type _headers: dict, optional - :param _host_index: set to override the host_index for a single - request; this effectively ignores the host_index - in the spec for a single request. - :type _host_index: int, optional - :return: Returns the result object. - """ # noqa: E501 - - _param = self._index_vulncheck_canaries3d_get_serialize( - page=page, - limit=limit, - cursor=cursor, - start_cursor=start_cursor, - order=order, - sort=sort, - cve=cve, - published=published, - src_country=src_country, - dst_country=dst_country, - src_ip=src_ip, - date=date, - updated_at_start_date=updated_at_start_date, - updated_at_end_date=updated_at_end_date, - last_mod_start_date=last_mod_start_date, - last_mod_end_date=last_mod_end_date, - pub_start_date=pub_start_date, - pub_end_date=pub_end_date, - _request_auth=_request_auth, - _content_type=_content_type, - _headers=_headers, - _host_index=_host_index - ) - - _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination", - '404': "str", - '500': "str", - } - response_data = await self.api_client.call_api( - *_param, - _request_timeout=_request_timeout - ) - await response_data.read() - return self.api_client.response_deserialize( - response_data=response_data, - response_types_map=_response_types_map, - ) - - - @validate_call - async def index_vulncheck_canaries3d_get_without_preload_content( - self, - page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, - limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, - cursor: Annotated[Optional[StrictStr], Field(description="continue server-side paging using a cursor id")] = None, - start_cursor: Annotated[Optional[StrictStr], Field(description="request server-side paging")] = None, - order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, - sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, - cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, - published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, - date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, - updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, - updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, - last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, - last_mod_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending last modified date to filter with.")] = None, - pub_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - pub_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, - _request_timeout: Union[ - None, - Annotated[StrictFloat, Field(gt=0)], - Tuple[ - Annotated[StrictFloat, Field(gt=0)], - Annotated[StrictFloat, Field(gt=0)] - ] - ] = None, - _request_auth: Optional[Dict[StrictStr, Any]] = None, - _content_type: Optional[StrictStr] = None, - _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RESTResponseType: - """Return vulnerability data stored in index \"vulncheck-canaries-3d\" - - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-3d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (3 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-3d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-3d?cursor=` - - :param page: set the page number of the response - :type page: int - :param limit: limit the number of findings in the response - :type limit: int - :param cursor: continue server-side paging using a cursor id - :type cursor: str - :param start_cursor: request server-side paging - :type start_cursor: str - :param order: direction of the sort - :type order: str - :param sort: field by which to sort the results - :type sort: str - :param cve: Specify a CVE ID to search with. - :type cve: str - :param published: Specify a published date - :type published: str - :param src_country: Country code in ISO-3166 format - :type src_country: str - :param dst_country: Country code in ISO-3166 format - :type dst_country: str - :param src_ip: Source IP address - :type src_ip: str - :param date: Specify an exact published date to filter with. - :type date: str - :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. - :type updated_at_start_date: str - :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. - :type updated_at_end_date: str - :param last_mod_start_date: Specify a starting last modified date to filter with. - :type last_mod_start_date: str - :param last_mod_end_date: Specify an ending last modified date to filter with. - :type last_mod_end_date: str - :param pub_start_date: Specify a starting published date to filter with. - :type pub_start_date: str - :param pub_end_date: Specify an ending published date to filter with. - :type pub_end_date: str - :param _request_timeout: timeout setting for this request. If one - number provided, it will be total request - timeout. It can also be a pair (tuple) of - (connection, read) timeouts. - :type _request_timeout: int, tuple(int, int), optional - :param _request_auth: set to override the auth_settings for an a single - request; this effectively ignores the - authentication in the spec for a single request. - :type _request_auth: dict, optional - :param _content_type: force content-type for the request. - :type _content_type: str, Optional - :param _headers: set to override the headers for a single - request; this effectively ignores the headers - in the spec for a single request. - :type _headers: dict, optional - :param _host_index: set to override the host_index for a single - request; this effectively ignores the host_index - in the spec for a single request. - :type _host_index: int, optional - :return: Returns the result object. - """ # noqa: E501 - - _param = self._index_vulncheck_canaries3d_get_serialize( - page=page, - limit=limit, - cursor=cursor, - start_cursor=start_cursor, - order=order, - sort=sort, - cve=cve, - published=published, - src_country=src_country, - dst_country=dst_country, - src_ip=src_ip, - date=date, - updated_at_start_date=updated_at_start_date, - updated_at_end_date=updated_at_end_date, - last_mod_start_date=last_mod_start_date, - last_mod_end_date=last_mod_end_date, - pub_start_date=pub_start_date, - pub_end_date=pub_end_date, - _request_auth=_request_auth, - _content_type=_content_type, - _headers=_headers, - _host_index=_host_index - ) - - _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination", - '404': "str", - '500': "str", - } - response_data = await self.api_client.call_api( - *_param, - _request_timeout=_request_timeout - ) - return response_data.response - - - def _index_vulncheck_canaries3d_get_serialize( - self, - page, - limit, - cursor, - start_cursor, - order, - sort, - cve, - published, - src_country, - dst_country, - src_ip, - date, - updated_at_start_date, - updated_at_end_date, - last_mod_start_date, - last_mod_end_date, - pub_start_date, - pub_end_date, - _request_auth, - _content_type, - _headers, - _host_index, - ) -> RequestSerialized: - - _hosts = [ - 'https://api.vulncheck.com' - ] - _host = _hosts[_host_index] - - _collection_formats: Dict[str, str] = { - } - - _path_params: Dict[str, str] = {} - _query_params: List[Tuple[str, str]] = [] - _header_params: Dict[str, Optional[str]] = _headers or {} - _form_params: List[Tuple[str, str]] = [] - _files: Dict[ - str, Union[str, bytes, List[str], List[bytes], List[Tuple[str, bytes]]] - ] = {} - _body_params: Optional[bytes] = None - - # process the path parameters - # process the query parameters - if page is not None: - - _query_params.append(('page', page)) - - if limit is not None: - - _query_params.append(('limit', limit)) - - if cursor is not None: - - _query_params.append(('cursor', cursor)) - - if start_cursor is not None: - - _query_params.append(('start_cursor', start_cursor)) - - if order is not None: - - _query_params.append(('order', order)) - - if sort is not None: - - _query_params.append(('sort', sort)) - - if cve is not None: - - _query_params.append(('cve', cve)) - - if published is not None: - - _query_params.append(('published', published)) - - if src_country is not None: - - _query_params.append(('src_country', src_country)) - - if dst_country is not None: - - _query_params.append(('dst_country', dst_country)) - - if src_ip is not None: - - _query_params.append(('src_ip', src_ip)) + _query_params.append(('src_asn', src_asn)) if date is not None: @@ -302214,6 +303591,7 @@ async def index_vulncheck_canaries90d_get( src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + src_asn: Annotated[Optional[StrictStr], Field(description="Source ASN in format AS12345")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -302260,6 +303638,8 @@ async def index_vulncheck_canaries90d_get( :type dst_country: str :param src_ip: Source IP address :type src_ip: str + :param src_asn: Source ASN in format AS12345 + :type src_asn: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -302308,6 +303688,7 @@ async def index_vulncheck_canaries90d_get( src_country=src_country, dst_country=dst_country, src_ip=src_ip, + src_asn=src_asn, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -302351,6 +303732,7 @@ async def index_vulncheck_canaries90d_get_with_http_info( src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + src_asn: Annotated[Optional[StrictStr], Field(description="Source ASN in format AS12345")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -302397,6 +303779,8 @@ async def index_vulncheck_canaries90d_get_with_http_info( :type dst_country: str :param src_ip: Source IP address :type src_ip: str + :param src_asn: Source ASN in format AS12345 + :type src_asn: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -302445,6 +303829,7 @@ async def index_vulncheck_canaries90d_get_with_http_info( src_country=src_country, dst_country=dst_country, src_ip=src_ip, + src_asn=src_asn, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -302488,6 +303873,7 @@ async def index_vulncheck_canaries90d_get_without_preload_content( src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + src_asn: Annotated[Optional[StrictStr], Field(description="Source ASN in format AS12345")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -302534,6 +303920,8 @@ async def index_vulncheck_canaries90d_get_without_preload_content( :type dst_country: str :param src_ip: Source IP address :type src_ip: str + :param src_asn: Source ASN in format AS12345 + :type src_asn: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -302582,6 +303970,7 @@ async def index_vulncheck_canaries90d_get_without_preload_content( src_country=src_country, dst_country=dst_country, src_ip=src_ip, + src_asn=src_asn, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -302620,6 +304009,7 @@ def _index_vulncheck_canaries90d_get_serialize( src_country, dst_country, src_ip, + src_asn, date, updated_at_start_date, updated_at_end_date, @@ -302696,6 +304086,10 @@ def _index_vulncheck_canaries90d_get_serialize( _query_params.append(('src_ip', src_ip)) + if src_asn is not None: + + _query_params.append(('src_asn', src_asn)) + if date is not None: _query_params.append(('date', date)) @@ -302775,6 +304169,7 @@ async def index_vulncheck_canaries_get( src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + src_asn: Annotated[Optional[StrictStr], Field(description="Source ASN in format AS12345")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -302821,6 +304216,8 @@ async def index_vulncheck_canaries_get( :type dst_country: str :param src_ip: Source IP address :type src_ip: str + :param src_asn: Source ASN in format AS12345 + :type src_asn: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -302869,6 +304266,7 @@ async def index_vulncheck_canaries_get( src_country=src_country, dst_country=dst_country, src_ip=src_ip, + src_asn=src_asn, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -302912,6 +304310,7 @@ async def index_vulncheck_canaries_get_with_http_info( src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + src_asn: Annotated[Optional[StrictStr], Field(description="Source ASN in format AS12345")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -302958,6 +304357,8 @@ async def index_vulncheck_canaries_get_with_http_info( :type dst_country: str :param src_ip: Source IP address :type src_ip: str + :param src_asn: Source ASN in format AS12345 + :type src_asn: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -303006,6 +304407,7 @@ async def index_vulncheck_canaries_get_with_http_info( src_country=src_country, dst_country=dst_country, src_ip=src_ip, + src_asn=src_asn, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -303049,6 +304451,7 @@ async def index_vulncheck_canaries_get_without_preload_content( src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + src_asn: Annotated[Optional[StrictStr], Field(description="Source ASN in format AS12345")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -303095,6 +304498,8 @@ async def index_vulncheck_canaries_get_without_preload_content( :type dst_country: str :param src_ip: Source IP address :type src_ip: str + :param src_asn: Source ASN in format AS12345 + :type src_asn: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -303143,6 +304548,7 @@ async def index_vulncheck_canaries_get_without_preload_content( src_country=src_country, dst_country=dst_country, src_ip=src_ip, + src_asn=src_asn, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -303181,6 +304587,7 @@ def _index_vulncheck_canaries_get_serialize( src_country, dst_country, src_ip, + src_asn, date, updated_at_start_date, updated_at_end_date, @@ -303257,6 +304664,10 @@ def _index_vulncheck_canaries_get_serialize( _query_params.append(('src_ip', src_ip)) + if src_asn is not None: + + _query_params.append(('src_asn', src_asn)) + if date is not None: _query_params.append(('date', date)) diff --git a/vulncheck_sdk/aio/api_client.py b/vulncheck_sdk/aio/api_client.py index b3b608fa..7791f44e 100644 --- a/vulncheck_sdk/aio/api_client.py +++ b/vulncheck_sdk/aio/api_client.py @@ -92,7 +92,7 @@ def __init__( self.default_headers[header_name] = header_value self.cookie = cookie # Set default User-Agent. - self.user_agent = 'OpenAPI-Generator/0.0.45/python' + self.user_agent = 'OpenAPI-Generator/0.0.46/python' self.client_side_validation = configuration.client_side_validation async def __aenter__(self): diff --git a/vulncheck_sdk/aio/configuration.py b/vulncheck_sdk/aio/configuration.py index 9c96a791..c1238102 100644 --- a/vulncheck_sdk/aio/configuration.py +++ b/vulncheck_sdk/aio/configuration.py @@ -532,7 +532,7 @@ def to_debug_report(self) -> str: "OS: {env}\n"\ "Python Version: {pyversion}\n"\ "Version of the API: latest\n"\ - "SDK Package Version: 0.0.45".\ + "SDK Package Version: 0.0.46".\ format(env=sys.platform, pyversion=sys.version) def get_host_settings(self) -> List[HostSetting]: diff --git a/vulncheck_sdk/aio/models/api_vuln_check_canary.py b/vulncheck_sdk/aio/models/api_vuln_check_canary.py index db1d7026..51fe3126 100644 --- a/vulncheck_sdk/aio/models/api_vuln_check_canary.py +++ b/vulncheck_sdk/aio/models/api_vuln_check_canary.py @@ -38,11 +38,14 @@ class ApiVulnCheckCanary(BaseModel): severity: Optional[StrictInt] = None signature: Optional[StrictStr] = None signature_id: Optional[StrictInt] = None + src_as_domain: Optional[StrictStr] = None + src_as_name: Optional[StrictStr] = None + src_asn: Optional[StrictStr] = None src_country: Optional[StrictStr] = None src_ip: Optional[StrictStr] = None src_port: Optional[StrictInt] = None timestamp: Optional[StrictStr] = None - __properties: ClassVar[List[str]] = ["category", "client_fingerprints", "cve", "dst_country", "http", "payload", "severity", "signature", "signature_id", "src_country", "src_ip", "src_port", "timestamp"] + __properties: ClassVar[List[str]] = ["category", "client_fingerprints", "cve", "dst_country", "http", "payload", "severity", "signature", "signature_id", "src_as_domain", "src_as_name", "src_asn", "src_country", "src_ip", "src_port", "timestamp"] model_config = ConfigDict( populate_by_name=True, @@ -110,6 +113,9 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: "severity": obj.get("severity"), "signature": obj.get("signature"), "signature_id": obj.get("signature_id"), + "src_as_domain": obj.get("src_as_domain"), + "src_as_name": obj.get("src_as_name"), + "src_asn": obj.get("src_asn"), "src_country": obj.get("src_country"), "src_ip": obj.get("src_ip"), "src_port": obj.get("src_port"), diff --git a/vulncheck_sdk/api/indices_api.py b/vulncheck_sdk/api/indices_api.py index d4d7c93f..933a200b 100644 --- a/vulncheck_sdk/api/indices_api.py +++ b/vulncheck_sdk/api/indices_api.py @@ -143710,7 +143710,7 @@ def _index_honeywell_get_serialize( @validate_call - def index_hp_get( + def index_hp_eol_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -143748,10 +143748,10 @@ def index_hp_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination: - """Return vulnerability data stored in index \"hp\" + ) -> RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination: + """Return vulnerability data stored in index \"hp-eol\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the hp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** HP Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/hp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/hp?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the hp-eol index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** End of Life Data for Hewlett-Packard Products ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/hp-eol?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/hp-eol?cursor=` :param page: set the page number of the response :type page: int @@ -143823,7 +143823,7 @@ def index_hp_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_hp_get_serialize( + _param = self._index_hp_eol_get_serialize( page=page, limit=limit, cursor=cursor, @@ -143855,7 +143855,7 @@ def index_hp_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination", '404': "str", '500': "str", } @@ -143871,7 +143871,7 @@ def index_hp_get( @validate_call - def index_hp_get_with_http_info( + def index_hp_eol_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -143909,10 +143909,10 @@ def index_hp_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination]: - """Return vulnerability data stored in index \"hp\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination]: + """Return vulnerability data stored in index \"hp-eol\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the hp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** HP Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/hp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/hp?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the hp-eol index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** End of Life Data for Hewlett-Packard Products ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/hp-eol?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/hp-eol?cursor=` :param page: set the page number of the response :type page: int @@ -143984,7 +143984,7 @@ def index_hp_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_hp_get_serialize( + _param = self._index_hp_eol_get_serialize( page=page, limit=limit, cursor=cursor, @@ -144016,7 +144016,7 @@ def index_hp_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination", '404': "str", '500': "str", } @@ -144032,7 +144032,7 @@ def index_hp_get_with_http_info( @validate_call - def index_hp_get_without_preload_content( + def index_hp_eol_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -144071,9 +144071,9 @@ def index_hp_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"hp\" + """Return vulnerability data stored in index \"hp-eol\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the hp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** HP Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/hp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/hp?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the hp-eol index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** End of Life Data for Hewlett-Packard Products ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/hp-eol?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/hp-eol?cursor=` :param page: set the page number of the response :type page: int @@ -144145,7 +144145,7 @@ def index_hp_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_hp_get_serialize( + _param = self._index_hp_eol_get_serialize( page=page, limit=limit, cursor=cursor, @@ -144177,7 +144177,7 @@ def index_hp_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination", '404': "str", '500': "str", } @@ -144188,7 +144188,7 @@ def index_hp_get_without_preload_content( return response_data.response - def _index_hp_get_serialize( + def _index_hp_eol_get_serialize( self, page, limit, @@ -144356,7 +144356,7 @@ def _index_hp_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/hp', + resource_path='/v3/index/hp-eol', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -144373,7 +144373,7 @@ def _index_hp_get_serialize( @validate_call - def index_hpe_get( + def index_hp_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -144411,10 +144411,10 @@ def index_hpe_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination: - """Return vulnerability data stored in index \"hpe\" + ) -> RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination: + """Return vulnerability data stored in index \"hp\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the hpe index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** HPE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/hpe?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/hpe?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the hp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** HP Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/hp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/hp?cursor=` :param page: set the page number of the response :type page: int @@ -144486,7 +144486,7 @@ def index_hpe_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_hpe_get_serialize( + _param = self._index_hp_get_serialize( page=page, limit=limit, cursor=cursor, @@ -144518,7 +144518,7 @@ def index_hpe_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination", '404': "str", '500': "str", } @@ -144534,7 +144534,7 @@ def index_hpe_get( @validate_call - def index_hpe_get_with_http_info( + def index_hp_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -144572,10 +144572,10 @@ def index_hpe_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination]: - """Return vulnerability data stored in index \"hpe\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination]: + """Return vulnerability data stored in index \"hp\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the hpe index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** HPE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/hpe?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/hpe?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the hp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** HP Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/hp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/hp?cursor=` :param page: set the page number of the response :type page: int @@ -144647,7 +144647,7 @@ def index_hpe_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_hpe_get_serialize( + _param = self._index_hp_get_serialize( page=page, limit=limit, cursor=cursor, @@ -144679,7 +144679,7 @@ def index_hpe_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination", '404': "str", '500': "str", } @@ -144695,7 +144695,7 @@ def index_hpe_get_with_http_info( @validate_call - def index_hpe_get_without_preload_content( + def index_hp_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -144734,9 +144734,9 @@ def index_hpe_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"hpe\" + """Return vulnerability data stored in index \"hp\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the hpe index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** HPE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/hpe?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/hpe?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the hp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** HP Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/hp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/hp?cursor=` :param page: set the page number of the response :type page: int @@ -144808,7 +144808,7 @@ def index_hpe_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_hpe_get_serialize( + _param = self._index_hp_get_serialize( page=page, limit=limit, cursor=cursor, @@ -144840,7 +144840,7 @@ def index_hpe_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination", '404': "str", '500': "str", } @@ -144851,7 +144851,7 @@ def index_hpe_get_without_preload_content( return response_data.response - def _index_hpe_get_serialize( + def _index_hp_get_serialize( self, page, limit, @@ -145019,7 +145019,7 @@ def _index_hpe_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/hpe', + resource_path='/v3/index/hp', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -145036,7 +145036,7 @@ def _index_hpe_get_serialize( @validate_call - def index_huawei_euleros_get( + def index_hpe_eol_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -145074,10 +145074,10 @@ def index_huawei_euleros_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryHuaweiEulerOSPaginatePagination: - """Return vulnerability data stored in index \"huawei-euleros\" + ) -> RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination: + """Return vulnerability data stored in index \"hpe-eol\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-euleros index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenEuler Operating System Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-euleros?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-euleros?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the hpe-eol index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Hewlett-Packard Enterprise End of Life Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/hpe-eol?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/hpe-eol?cursor=` :param page: set the page number of the response :type page: int @@ -145149,7 +145149,7 @@ def index_huawei_euleros_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_huawei_euleros_get_serialize( + _param = self._index_hpe_eol_get_serialize( page=page, limit=limit, cursor=cursor, @@ -145181,7 +145181,7 @@ def index_huawei_euleros_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiEulerOSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination", '404': "str", '500': "str", } @@ -145197,7 +145197,7 @@ def index_huawei_euleros_get( @validate_call - def index_huawei_euleros_get_with_http_info( + def index_hpe_eol_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -145235,10 +145235,10 @@ def index_huawei_euleros_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHuaweiEulerOSPaginatePagination]: - """Return vulnerability data stored in index \"huawei-euleros\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination]: + """Return vulnerability data stored in index \"hpe-eol\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-euleros index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenEuler Operating System Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-euleros?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-euleros?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the hpe-eol index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Hewlett-Packard Enterprise End of Life Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/hpe-eol?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/hpe-eol?cursor=` :param page: set the page number of the response :type page: int @@ -145310,7 +145310,7 @@ def index_huawei_euleros_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_huawei_euleros_get_serialize( + _param = self._index_hpe_eol_get_serialize( page=page, limit=limit, cursor=cursor, @@ -145342,7 +145342,7 @@ def index_huawei_euleros_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiEulerOSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination", '404': "str", '500': "str", } @@ -145358,7 +145358,7 @@ def index_huawei_euleros_get_with_http_info( @validate_call - def index_huawei_euleros_get_without_preload_content( + def index_hpe_eol_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -145397,9 +145397,9 @@ def index_huawei_euleros_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"huawei-euleros\" + """Return vulnerability data stored in index \"hpe-eol\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-euleros index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenEuler Operating System Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-euleros?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-euleros?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the hpe-eol index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Hewlett-Packard Enterprise End of Life Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/hpe-eol?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/hpe-eol?cursor=` :param page: set the page number of the response :type page: int @@ -145471,7 +145471,7 @@ def index_huawei_euleros_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_huawei_euleros_get_serialize( + _param = self._index_hpe_eol_get_serialize( page=page, limit=limit, cursor=cursor, @@ -145503,7 +145503,7 @@ def index_huawei_euleros_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiEulerOSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination", '404': "str", '500': "str", } @@ -145514,7 +145514,7 @@ def index_huawei_euleros_get_without_preload_content( return response_data.response - def _index_huawei_euleros_get_serialize( + def _index_hpe_eol_get_serialize( self, page, limit, @@ -145682,7 +145682,7 @@ def _index_huawei_euleros_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/huawei-euleros', + resource_path='/v3/index/hpe-eol', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -145699,7 +145699,7 @@ def _index_huawei_euleros_get_serialize( @validate_call - def index_huawei_ips_get( + def index_hpe_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -145737,10 +145737,10 @@ def index_huawei_ips_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryHuaweiIPSPaginatePagination: - """Return vulnerability data stored in index \"huawei-ips\" + ) -> RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination: + """Return vulnerability data stored in index \"hpe\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-ips index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Huawei IPS Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-ips?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-ips?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the hpe index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** HPE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/hpe?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/hpe?cursor=` :param page: set the page number of the response :type page: int @@ -145812,7 +145812,7 @@ def index_huawei_ips_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_huawei_ips_get_serialize( + _param = self._index_hpe_get_serialize( page=page, limit=limit, cursor=cursor, @@ -145844,7 +145844,7 @@ def index_huawei_ips_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiIPSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination", '404': "str", '500': "str", } @@ -145860,7 +145860,7 @@ def index_huawei_ips_get( @validate_call - def index_huawei_ips_get_with_http_info( + def index_hpe_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -145898,10 +145898,10 @@ def index_huawei_ips_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHuaweiIPSPaginatePagination]: - """Return vulnerability data stored in index \"huawei-ips\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination]: + """Return vulnerability data stored in index \"hpe\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-ips index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Huawei IPS Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-ips?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-ips?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the hpe index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** HPE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/hpe?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/hpe?cursor=` :param page: set the page number of the response :type page: int @@ -145973,7 +145973,7 @@ def index_huawei_ips_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_huawei_ips_get_serialize( + _param = self._index_hpe_get_serialize( page=page, limit=limit, cursor=cursor, @@ -146005,7 +146005,7 @@ def index_huawei_ips_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiIPSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination", '404': "str", '500': "str", } @@ -146021,7 +146021,7 @@ def index_huawei_ips_get_with_http_info( @validate_call - def index_huawei_ips_get_without_preload_content( + def index_hpe_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -146060,9 +146060,9 @@ def index_huawei_ips_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"huawei-ips\" + """Return vulnerability data stored in index \"hpe\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-ips index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Huawei IPS Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-ips?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-ips?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the hpe index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** HPE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/hpe?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/hpe?cursor=` :param page: set the page number of the response :type page: int @@ -146134,7 +146134,7 @@ def index_huawei_ips_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_huawei_ips_get_serialize( + _param = self._index_hpe_get_serialize( page=page, limit=limit, cursor=cursor, @@ -146166,7 +146166,7 @@ def index_huawei_ips_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiIPSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination", '404': "str", '500': "str", } @@ -146177,7 +146177,7 @@ def index_huawei_ips_get_without_preload_content( return response_data.response - def _index_huawei_ips_get_serialize( + def _index_hpe_get_serialize( self, page, limit, @@ -146345,7 +146345,7 @@ def _index_huawei_ips_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/huawei-ips', + resource_path='/v3/index/hpe', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -146362,7 +146362,7 @@ def _index_huawei_ips_get_serialize( @validate_call - def index_huawei_psirt_get( + def index_huawei_euleros_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -146400,10 +146400,10 @@ def index_huawei_psirt_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryHuaweiPaginatePagination: - """Return vulnerability data stored in index \"huawei-psirt\" + ) -> RenderResponseWithMetadataArrayAdvisoryHuaweiEulerOSPaginatePagination: + """Return vulnerability data stored in index \"huawei-euleros\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-psirt index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Huawei Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-psirt?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-psirt?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-euleros index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenEuler Operating System Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-euleros?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-euleros?cursor=` :param page: set the page number of the response :type page: int @@ -146475,7 +146475,7 @@ def index_huawei_psirt_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_huawei_psirt_get_serialize( + _param = self._index_huawei_euleros_get_serialize( page=page, limit=limit, cursor=cursor, @@ -146507,7 +146507,7 @@ def index_huawei_psirt_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiEulerOSPaginatePagination", '404': "str", '500': "str", } @@ -146523,7 +146523,7 @@ def index_huawei_psirt_get( @validate_call - def index_huawei_psirt_get_with_http_info( + def index_huawei_euleros_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -146561,10 +146561,10 @@ def index_huawei_psirt_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHuaweiPaginatePagination]: - """Return vulnerability data stored in index \"huawei-psirt\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHuaweiEulerOSPaginatePagination]: + """Return vulnerability data stored in index \"huawei-euleros\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-psirt index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Huawei Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-psirt?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-psirt?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-euleros index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenEuler Operating System Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-euleros?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-euleros?cursor=` :param page: set the page number of the response :type page: int @@ -146636,7 +146636,7 @@ def index_huawei_psirt_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_huawei_psirt_get_serialize( + _param = self._index_huawei_euleros_get_serialize( page=page, limit=limit, cursor=cursor, @@ -146668,7 +146668,7 @@ def index_huawei_psirt_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiEulerOSPaginatePagination", '404': "str", '500': "str", } @@ -146684,7 +146684,7 @@ def index_huawei_psirt_get_with_http_info( @validate_call - def index_huawei_psirt_get_without_preload_content( + def index_huawei_euleros_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -146723,9 +146723,9 @@ def index_huawei_psirt_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"huawei-psirt\" + """Return vulnerability data stored in index \"huawei-euleros\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-psirt index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Huawei Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-psirt?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-psirt?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-euleros index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenEuler Operating System Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-euleros?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-euleros?cursor=` :param page: set the page number of the response :type page: int @@ -146797,7 +146797,7 @@ def index_huawei_psirt_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_huawei_psirt_get_serialize( + _param = self._index_huawei_euleros_get_serialize( page=page, limit=limit, cursor=cursor, @@ -146829,7 +146829,7 @@ def index_huawei_psirt_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiEulerOSPaginatePagination", '404': "str", '500': "str", } @@ -146840,7 +146840,7 @@ def index_huawei_psirt_get_without_preload_content( return response_data.response - def _index_huawei_psirt_get_serialize( + def _index_huawei_euleros_get_serialize( self, page, limit, @@ -147008,7 +147008,7 @@ def _index_huawei_psirt_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/huawei-psirt', + resource_path='/v3/index/huawei-euleros', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -147025,7 +147025,7 @@ def _index_huawei_psirt_get_serialize( @validate_call - def index_iava_get( + def index_huawei_ips_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -147063,10 +147063,10 @@ def index_iava_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryIAVAPaginatePagination: - """Return vulnerability data stored in index \"iava\" + ) -> RenderResponseWithMetadataArrayAdvisoryHuaweiIPSPaginatePagination: + """Return vulnerability data stored in index \"huawei-ips\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the iava index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Information Assurance Vulnerability Alerts (IAVA) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/iava?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/iava?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-ips index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Huawei IPS Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-ips?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-ips?cursor=` :param page: set the page number of the response :type page: int @@ -147138,7 +147138,7 @@ def index_iava_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_iava_get_serialize( + _param = self._index_huawei_ips_get_serialize( page=page, limit=limit, cursor=cursor, @@ -147170,7 +147170,7 @@ def index_iava_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIAVAPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiIPSPaginatePagination", '404': "str", '500': "str", } @@ -147186,7 +147186,7 @@ def index_iava_get( @validate_call - def index_iava_get_with_http_info( + def index_huawei_ips_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -147224,10 +147224,10 @@ def index_iava_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIAVAPaginatePagination]: - """Return vulnerability data stored in index \"iava\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHuaweiIPSPaginatePagination]: + """Return vulnerability data stored in index \"huawei-ips\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the iava index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Information Assurance Vulnerability Alerts (IAVA) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/iava?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/iava?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-ips index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Huawei IPS Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-ips?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-ips?cursor=` :param page: set the page number of the response :type page: int @@ -147299,7 +147299,7 @@ def index_iava_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_iava_get_serialize( + _param = self._index_huawei_ips_get_serialize( page=page, limit=limit, cursor=cursor, @@ -147331,7 +147331,7 @@ def index_iava_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIAVAPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiIPSPaginatePagination", '404': "str", '500': "str", } @@ -147347,7 +147347,7 @@ def index_iava_get_with_http_info( @validate_call - def index_iava_get_without_preload_content( + def index_huawei_ips_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -147386,9 +147386,9 @@ def index_iava_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"iava\" + """Return vulnerability data stored in index \"huawei-ips\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the iava index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Information Assurance Vulnerability Alerts (IAVA) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/iava?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/iava?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-ips index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Huawei IPS Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-ips?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-ips?cursor=` :param page: set the page number of the response :type page: int @@ -147460,7 +147460,7 @@ def index_iava_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_iava_get_serialize( + _param = self._index_huawei_ips_get_serialize( page=page, limit=limit, cursor=cursor, @@ -147492,7 +147492,7 @@ def index_iava_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIAVAPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiIPSPaginatePagination", '404': "str", '500': "str", } @@ -147503,7 +147503,7 @@ def index_iava_get_without_preload_content( return response_data.response - def _index_iava_get_serialize( + def _index_huawei_ips_get_serialize( self, page, limit, @@ -147671,7 +147671,7 @@ def _index_iava_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/iava', + resource_path='/v3/index/huawei-ips', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -147688,7 +147688,7 @@ def _index_iava_get_serialize( @validate_call - def index_ibm_get( + def index_huawei_psirt_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -147726,10 +147726,10 @@ def index_ibm_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryIBMPaginatePagination: - """Return vulnerability data stored in index \"ibm\" + ) -> RenderResponseWithMetadataArrayAdvisoryHuaweiPaginatePagination: + """Return vulnerability data stored in index \"huawei-psirt\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ibm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** IBM Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ibm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ibm?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-psirt index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Huawei Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-psirt?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-psirt?cursor=` :param page: set the page number of the response :type page: int @@ -147801,7 +147801,7 @@ def index_ibm_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ibm_get_serialize( + _param = self._index_huawei_psirt_get_serialize( page=page, limit=limit, cursor=cursor, @@ -147833,7 +147833,7 @@ def index_ibm_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIBMPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiPaginatePagination", '404': "str", '500': "str", } @@ -147849,7 +147849,7 @@ def index_ibm_get( @validate_call - def index_ibm_get_with_http_info( + def index_huawei_psirt_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -147887,10 +147887,10 @@ def index_ibm_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIBMPaginatePagination]: - """Return vulnerability data stored in index \"ibm\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryHuaweiPaginatePagination]: + """Return vulnerability data stored in index \"huawei-psirt\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ibm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** IBM Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ibm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ibm?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-psirt index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Huawei Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-psirt?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-psirt?cursor=` :param page: set the page number of the response :type page: int @@ -147962,7 +147962,7 @@ def index_ibm_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ibm_get_serialize( + _param = self._index_huawei_psirt_get_serialize( page=page, limit=limit, cursor=cursor, @@ -147994,7 +147994,7 @@ def index_ibm_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIBMPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiPaginatePagination", '404': "str", '500': "str", } @@ -148010,7 +148010,7 @@ def index_ibm_get_with_http_info( @validate_call - def index_ibm_get_without_preload_content( + def index_huawei_psirt_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -148049,9 +148049,9 @@ def index_ibm_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ibm\" + """Return vulnerability data stored in index \"huawei-psirt\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ibm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** IBM Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ibm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ibm?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the huawei-psirt index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Huawei Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-psirt?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/huawei-psirt?cursor=` :param page: set the page number of the response :type page: int @@ -148123,7 +148123,7 @@ def index_ibm_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ibm_get_serialize( + _param = self._index_huawei_psirt_get_serialize( page=page, limit=limit, cursor=cursor, @@ -148155,7 +148155,7 @@ def index_ibm_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIBMPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryHuaweiPaginatePagination", '404': "str", '500': "str", } @@ -148166,7 +148166,7 @@ def index_ibm_get_without_preload_content( return response_data.response - def _index_ibm_get_serialize( + def _index_huawei_psirt_get_serialize( self, page, limit, @@ -148334,7 +148334,7 @@ def _index_ibm_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ibm', + resource_path='/v3/index/huawei-psirt', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -148351,7 +148351,7 @@ def _index_ibm_get_serialize( @validate_call - def index_idemia_get( + def index_iava_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -148389,10 +148389,10 @@ def index_idemia_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryIdemiaPaginatePagination: - """Return vulnerability data stored in index \"idemia\" + ) -> RenderResponseWithMetadataArrayAdvisoryIAVAPaginatePagination: + """Return vulnerability data stored in index \"iava\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the idemia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Idemia Product Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/idemia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/idemia?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the iava index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Information Assurance Vulnerability Alerts (IAVA) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/iava?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/iava?cursor=` :param page: set the page number of the response :type page: int @@ -148464,7 +148464,7 @@ def index_idemia_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_idemia_get_serialize( + _param = self._index_iava_get_serialize( page=page, limit=limit, cursor=cursor, @@ -148496,7 +148496,7 @@ def index_idemia_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIdemiaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIAVAPaginatePagination", '404': "str", '500': "str", } @@ -148512,7 +148512,7 @@ def index_idemia_get( @validate_call - def index_idemia_get_with_http_info( + def index_iava_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -148550,10 +148550,10 @@ def index_idemia_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIdemiaPaginatePagination]: - """Return vulnerability data stored in index \"idemia\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIAVAPaginatePagination]: + """Return vulnerability data stored in index \"iava\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the idemia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Idemia Product Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/idemia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/idemia?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the iava index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Information Assurance Vulnerability Alerts (IAVA) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/iava?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/iava?cursor=` :param page: set the page number of the response :type page: int @@ -148625,7 +148625,7 @@ def index_idemia_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_idemia_get_serialize( + _param = self._index_iava_get_serialize( page=page, limit=limit, cursor=cursor, @@ -148657,7 +148657,7 @@ def index_idemia_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIdemiaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIAVAPaginatePagination", '404': "str", '500': "str", } @@ -148673,7 +148673,7 @@ def index_idemia_get_with_http_info( @validate_call - def index_idemia_get_without_preload_content( + def index_iava_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -148712,9 +148712,9 @@ def index_idemia_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"idemia\" + """Return vulnerability data stored in index \"iava\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the idemia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Idemia Product Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/idemia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/idemia?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the iava index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Information Assurance Vulnerability Alerts (IAVA) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/iava?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/iava?cursor=` :param page: set the page number of the response :type page: int @@ -148786,7 +148786,7 @@ def index_idemia_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_idemia_get_serialize( + _param = self._index_iava_get_serialize( page=page, limit=limit, cursor=cursor, @@ -148818,7 +148818,7 @@ def index_idemia_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIdemiaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIAVAPaginatePagination", '404': "str", '500': "str", } @@ -148829,7 +148829,7 @@ def index_idemia_get_without_preload_content( return response_data.response - def _index_idemia_get_serialize( + def _index_iava_get_serialize( self, page, limit, @@ -148997,7 +148997,7 @@ def _index_idemia_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/idemia', + resource_path='/v3/index/iava', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -149014,7 +149014,7 @@ def _index_idemia_get_serialize( @validate_call - def index_igel_get( + def index_ibm_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -149052,10 +149052,10 @@ def index_igel_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryIgelPaginatePagination: - """Return vulnerability data stored in index \"igel\" + ) -> RenderResponseWithMetadataArrayAdvisoryIBMPaginatePagination: + """Return vulnerability data stored in index \"ibm\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the igel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** IGEL Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/igel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/igel?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ibm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** IBM Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ibm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ibm?cursor=` :param page: set the page number of the response :type page: int @@ -149127,7 +149127,7 @@ def index_igel_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_igel_get_serialize( + _param = self._index_ibm_get_serialize( page=page, limit=limit, cursor=cursor, @@ -149159,7 +149159,7 @@ def index_igel_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIgelPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIBMPaginatePagination", '404': "str", '500': "str", } @@ -149175,7 +149175,7 @@ def index_igel_get( @validate_call - def index_igel_get_with_http_info( + def index_ibm_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -149213,10 +149213,10 @@ def index_igel_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIgelPaginatePagination]: - """Return vulnerability data stored in index \"igel\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIBMPaginatePagination]: + """Return vulnerability data stored in index \"ibm\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the igel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** IGEL Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/igel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/igel?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ibm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** IBM Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ibm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ibm?cursor=` :param page: set the page number of the response :type page: int @@ -149288,7 +149288,7 @@ def index_igel_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_igel_get_serialize( + _param = self._index_ibm_get_serialize( page=page, limit=limit, cursor=cursor, @@ -149320,7 +149320,7 @@ def index_igel_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIgelPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIBMPaginatePagination", '404': "str", '500': "str", } @@ -149336,7 +149336,7 @@ def index_igel_get_with_http_info( @validate_call - def index_igel_get_without_preload_content( + def index_ibm_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -149375,9 +149375,9 @@ def index_igel_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"igel\" + """Return vulnerability data stored in index \"ibm\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the igel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** IGEL Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/igel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/igel?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ibm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** IBM Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ibm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ibm?cursor=` :param page: set the page number of the response :type page: int @@ -149449,7 +149449,7 @@ def index_igel_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_igel_get_serialize( + _param = self._index_ibm_get_serialize( page=page, limit=limit, cursor=cursor, @@ -149481,7 +149481,7 @@ def index_igel_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIgelPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIBMPaginatePagination", '404': "str", '500': "str", } @@ -149492,7 +149492,7 @@ def index_igel_get_without_preload_content( return response_data.response - def _index_igel_get_serialize( + def _index_ibm_get_serialize( self, page, limit, @@ -149660,7 +149660,7 @@ def _index_igel_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/igel', + resource_path='/v3/index/ibm', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -149677,7 +149677,7 @@ def _index_igel_get_serialize( @validate_call - def index_il_alerts_get( + def index_idemia_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -149715,10 +149715,10 @@ def index_il_alerts_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryIsraeliAlertPaginatePagination: - """Return vulnerability data stored in index \"il-alerts\" + ) -> RenderResponseWithMetadataArrayAdvisoryIdemiaPaginatePagination: + """Return vulnerability data stored in index \"idemia\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the il-alerts index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Gov.il Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/il-alerts?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/il-alerts?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the idemia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Idemia Product Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/idemia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/idemia?cursor=` :param page: set the page number of the response :type page: int @@ -149790,7 +149790,7 @@ def index_il_alerts_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_il_alerts_get_serialize( + _param = self._index_idemia_get_serialize( page=page, limit=limit, cursor=cursor, @@ -149822,7 +149822,7 @@ def index_il_alerts_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIsraeliAlertPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIdemiaPaginatePagination", '404': "str", '500': "str", } @@ -149838,7 +149838,7 @@ def index_il_alerts_get( @validate_call - def index_il_alerts_get_with_http_info( + def index_idemia_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -149876,10 +149876,10 @@ def index_il_alerts_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIsraeliAlertPaginatePagination]: - """Return vulnerability data stored in index \"il-alerts\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIdemiaPaginatePagination]: + """Return vulnerability data stored in index \"idemia\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the il-alerts index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Gov.il Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/il-alerts?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/il-alerts?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the idemia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Idemia Product Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/idemia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/idemia?cursor=` :param page: set the page number of the response :type page: int @@ -149951,7 +149951,7 @@ def index_il_alerts_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_il_alerts_get_serialize( + _param = self._index_idemia_get_serialize( page=page, limit=limit, cursor=cursor, @@ -149983,7 +149983,7 @@ def index_il_alerts_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIsraeliAlertPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIdemiaPaginatePagination", '404': "str", '500': "str", } @@ -149999,7 +149999,7 @@ def index_il_alerts_get_with_http_info( @validate_call - def index_il_alerts_get_without_preload_content( + def index_idemia_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -150038,9 +150038,9 @@ def index_il_alerts_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"il-alerts\" + """Return vulnerability data stored in index \"idemia\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the il-alerts index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Gov.il Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/il-alerts?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/il-alerts?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the idemia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Idemia Product Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/idemia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/idemia?cursor=` :param page: set the page number of the response :type page: int @@ -150112,7 +150112,7 @@ def index_il_alerts_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_il_alerts_get_serialize( + _param = self._index_idemia_get_serialize( page=page, limit=limit, cursor=cursor, @@ -150144,7 +150144,7 @@ def index_il_alerts_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIsraeliAlertPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIdemiaPaginatePagination", '404': "str", '500': "str", } @@ -150155,7 +150155,7 @@ def index_il_alerts_get_without_preload_content( return response_data.response - def _index_il_alerts_get_serialize( + def _index_idemia_get_serialize( self, page, limit, @@ -150323,7 +150323,7 @@ def _index_il_alerts_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/il-alerts', + resource_path='/v3/index/idemia', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -150340,7 +150340,7 @@ def _index_il_alerts_get_serialize( @validate_call - def index_il_vulnerabilities_get( + def index_igel_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -150378,10 +150378,10 @@ def index_il_vulnerabilities_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryIsraeliVulnerabilityPaginatePagination: - """Return vulnerability data stored in index \"il-vulnerabilities\" + ) -> RenderResponseWithMetadataArrayAdvisoryIgelPaginatePagination: + """Return vulnerability data stored in index \"igel\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the il-vulnerabilities index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Gov.il CVE Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/il-vulnerabilities?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/il-vulnerabilities?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the igel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** IGEL Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/igel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/igel?cursor=` :param page: set the page number of the response :type page: int @@ -150453,7 +150453,7 @@ def index_il_vulnerabilities_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_il_vulnerabilities_get_serialize( + _param = self._index_igel_get_serialize( page=page, limit=limit, cursor=cursor, @@ -150485,7 +150485,7 @@ def index_il_vulnerabilities_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIsraeliVulnerabilityPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIgelPaginatePagination", '404': "str", '500': "str", } @@ -150501,7 +150501,7 @@ def index_il_vulnerabilities_get( @validate_call - def index_il_vulnerabilities_get_with_http_info( + def index_igel_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -150539,10 +150539,10 @@ def index_il_vulnerabilities_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIsraeliVulnerabilityPaginatePagination]: - """Return vulnerability data stored in index \"il-vulnerabilities\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIgelPaginatePagination]: + """Return vulnerability data stored in index \"igel\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the il-vulnerabilities index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Gov.il CVE Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/il-vulnerabilities?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/il-vulnerabilities?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the igel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** IGEL Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/igel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/igel?cursor=` :param page: set the page number of the response :type page: int @@ -150614,7 +150614,7 @@ def index_il_vulnerabilities_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_il_vulnerabilities_get_serialize( + _param = self._index_igel_get_serialize( page=page, limit=limit, cursor=cursor, @@ -150646,7 +150646,7 @@ def index_il_vulnerabilities_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIsraeliVulnerabilityPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIgelPaginatePagination", '404': "str", '500': "str", } @@ -150662,7 +150662,7 @@ def index_il_vulnerabilities_get_with_http_info( @validate_call - def index_il_vulnerabilities_get_without_preload_content( + def index_igel_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -150701,9 +150701,9 @@ def index_il_vulnerabilities_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"il-vulnerabilities\" + """Return vulnerability data stored in index \"igel\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the il-vulnerabilities index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Gov.il CVE Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/il-vulnerabilities?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/il-vulnerabilities?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the igel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** IGEL Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/igel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/igel?cursor=` :param page: set the page number of the response :type page: int @@ -150775,7 +150775,7 @@ def index_il_vulnerabilities_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_il_vulnerabilities_get_serialize( + _param = self._index_igel_get_serialize( page=page, limit=limit, cursor=cursor, @@ -150807,7 +150807,7 @@ def index_il_vulnerabilities_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIsraeliVulnerabilityPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIgelPaginatePagination", '404': "str", '500': "str", } @@ -150818,7 +150818,7 @@ def index_il_vulnerabilities_get_without_preload_content( return response_data.response - def _index_il_vulnerabilities_get_serialize( + def _index_igel_get_serialize( self, page, limit, @@ -150986,7 +150986,7 @@ def _index_il_vulnerabilities_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/il-vulnerabilities', + resource_path='/v3/index/igel', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -151003,7 +151003,7 @@ def _index_il_vulnerabilities_get_serialize( @validate_call - def index_incibe_get( + def index_il_alerts_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -151041,10 +151041,10 @@ def index_incibe_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryIncibeAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"incibe\" + ) -> RenderResponseWithMetadataArrayAdvisoryIsraeliAlertPaginatePagination: + """Return vulnerability data stored in index \"il-alerts\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the incibe index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Incibe CERT Early Warnings ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/incibe?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/incibe?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the il-alerts index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Gov.il Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/il-alerts?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/il-alerts?cursor=` :param page: set the page number of the response :type page: int @@ -151116,7 +151116,7 @@ def index_incibe_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_incibe_get_serialize( + _param = self._index_il_alerts_get_serialize( page=page, limit=limit, cursor=cursor, @@ -151148,7 +151148,7 @@ def index_incibe_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIncibeAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIsraeliAlertPaginatePagination", '404': "str", '500': "str", } @@ -151164,7 +151164,7 @@ def index_incibe_get( @validate_call - def index_incibe_get_with_http_info( + def index_il_alerts_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -151202,10 +151202,10 @@ def index_incibe_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIncibeAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"incibe\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIsraeliAlertPaginatePagination]: + """Return vulnerability data stored in index \"il-alerts\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the incibe index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Incibe CERT Early Warnings ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/incibe?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/incibe?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the il-alerts index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Gov.il Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/il-alerts?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/il-alerts?cursor=` :param page: set the page number of the response :type page: int @@ -151277,7 +151277,7 @@ def index_incibe_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_incibe_get_serialize( + _param = self._index_il_alerts_get_serialize( page=page, limit=limit, cursor=cursor, @@ -151309,7 +151309,7 @@ def index_incibe_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIncibeAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIsraeliAlertPaginatePagination", '404': "str", '500': "str", } @@ -151325,7 +151325,7 @@ def index_incibe_get_with_http_info( @validate_call - def index_incibe_get_without_preload_content( + def index_il_alerts_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -151364,9 +151364,9 @@ def index_incibe_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"incibe\" + """Return vulnerability data stored in index \"il-alerts\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the incibe index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Incibe CERT Early Warnings ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/incibe?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/incibe?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the il-alerts index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Gov.il Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/il-alerts?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/il-alerts?cursor=` :param page: set the page number of the response :type page: int @@ -151438,7 +151438,7 @@ def index_incibe_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_incibe_get_serialize( + _param = self._index_il_alerts_get_serialize( page=page, limit=limit, cursor=cursor, @@ -151470,7 +151470,7 @@ def index_incibe_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIncibeAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIsraeliAlertPaginatePagination", '404': "str", '500': "str", } @@ -151481,7 +151481,7 @@ def index_incibe_get_without_preload_content( return response_data.response - def _index_incibe_get_serialize( + def _index_il_alerts_get_serialize( self, page, limit, @@ -151649,7 +151649,7 @@ def _index_incibe_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/incibe', + resource_path='/v3/index/il-alerts', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -151666,7 +151666,7 @@ def _index_incibe_get_serialize( @validate_call - def index_initial_access_get( + def index_il_vulnerabilities_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -151704,10 +151704,10 @@ def index_initial_access_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination: - """Return vulnerability data stored in index \"initial-access\" + ) -> RenderResponseWithMetadataArrayAdvisoryIsraeliVulnerabilityPaginatePagination: + """Return vulnerability data stored in index \"il-vulnerabilities\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the initial-access index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Initial Access Intelligence ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/initial-access?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the il-vulnerabilities index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Gov.il CVE Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/il-vulnerabilities?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/il-vulnerabilities?cursor=` :param page: set the page number of the response :type page: int @@ -151779,7 +151779,7 @@ def index_initial_access_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_initial_access_get_serialize( + _param = self._index_il_vulnerabilities_get_serialize( page=page, limit=limit, cursor=cursor, @@ -151811,7 +151811,7 @@ def index_initial_access_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIsraeliVulnerabilityPaginatePagination", '404': "str", '500': "str", } @@ -151827,7 +151827,7 @@ def index_initial_access_get( @validate_call - def index_initial_access_get_with_http_info( + def index_il_vulnerabilities_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -151865,10 +151865,10 @@ def index_initial_access_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination]: - """Return vulnerability data stored in index \"initial-access\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIsraeliVulnerabilityPaginatePagination]: + """Return vulnerability data stored in index \"il-vulnerabilities\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the initial-access index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Initial Access Intelligence ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/initial-access?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the il-vulnerabilities index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Gov.il CVE Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/il-vulnerabilities?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/il-vulnerabilities?cursor=` :param page: set the page number of the response :type page: int @@ -151940,7 +151940,7 @@ def index_initial_access_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_initial_access_get_serialize( + _param = self._index_il_vulnerabilities_get_serialize( page=page, limit=limit, cursor=cursor, @@ -151972,7 +151972,7 @@ def index_initial_access_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIsraeliVulnerabilityPaginatePagination", '404': "str", '500': "str", } @@ -151988,7 +151988,7 @@ def index_initial_access_get_with_http_info( @validate_call - def index_initial_access_get_without_preload_content( + def index_il_vulnerabilities_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -152027,9 +152027,9 @@ def index_initial_access_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"initial-access\" + """Return vulnerability data stored in index \"il-vulnerabilities\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the initial-access index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Initial Access Intelligence ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/initial-access?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the il-vulnerabilities index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Gov.il CVE Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/il-vulnerabilities?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/il-vulnerabilities?cursor=` :param page: set the page number of the response :type page: int @@ -152101,7 +152101,7 @@ def index_initial_access_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_initial_access_get_serialize( + _param = self._index_il_vulnerabilities_get_serialize( page=page, limit=limit, cursor=cursor, @@ -152133,7 +152133,7 @@ def index_initial_access_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIsraeliVulnerabilityPaginatePagination", '404': "str", '500': "str", } @@ -152144,7 +152144,7 @@ def index_initial_access_get_without_preload_content( return response_data.response - def _index_initial_access_get_serialize( + def _index_il_vulnerabilities_get_serialize( self, page, limit, @@ -152312,7 +152312,7 @@ def _index_initial_access_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/initial-access', + resource_path='/v3/index/il-vulnerabilities', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -152329,7 +152329,7 @@ def _index_initial_access_get_serialize( @validate_call - def index_initial_access_git_get( + def index_incibe_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -152367,10 +152367,10 @@ def index_initial_access_git_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination: - """Return vulnerability data stored in index \"initial-access-git\" + ) -> RenderResponseWithMetadataArrayAdvisoryIncibeAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"incibe\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the initial-access-git index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Initial Access Intelligence Git Backup for Subscribers ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access-git?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/initial-access-git?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the incibe index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Incibe CERT Early Warnings ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/incibe?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/incibe?cursor=` :param page: set the page number of the response :type page: int @@ -152442,7 +152442,7 @@ def index_initial_access_git_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_initial_access_git_get_serialize( + _param = self._index_incibe_get_serialize( page=page, limit=limit, cursor=cursor, @@ -152474,7 +152474,7 @@ def index_initial_access_git_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIncibeAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -152490,7 +152490,7 @@ def index_initial_access_git_get( @validate_call - def index_initial_access_git_get_with_http_info( + def index_incibe_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -152528,10 +152528,10 @@ def index_initial_access_git_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination]: - """Return vulnerability data stored in index \"initial-access-git\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIncibeAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"incibe\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the initial-access-git index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Initial Access Intelligence Git Backup for Subscribers ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access-git?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/initial-access-git?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the incibe index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Incibe CERT Early Warnings ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/incibe?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/incibe?cursor=` :param page: set the page number of the response :type page: int @@ -152603,7 +152603,7 @@ def index_initial_access_git_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_initial_access_git_get_serialize( + _param = self._index_incibe_get_serialize( page=page, limit=limit, cursor=cursor, @@ -152635,7 +152635,7 @@ def index_initial_access_git_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIncibeAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -152651,7 +152651,7 @@ def index_initial_access_git_get_with_http_info( @validate_call - def index_initial_access_git_get_without_preload_content( + def index_incibe_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -152690,9 +152690,9 @@ def index_initial_access_git_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"initial-access-git\" + """Return vulnerability data stored in index \"incibe\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the initial-access-git index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Initial Access Intelligence Git Backup for Subscribers ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access-git?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/initial-access-git?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the incibe index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Incibe CERT Early Warnings ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/incibe?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/incibe?cursor=` :param page: set the page number of the response :type page: int @@ -152764,7 +152764,7 @@ def index_initial_access_git_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_initial_access_git_get_serialize( + _param = self._index_incibe_get_serialize( page=page, limit=limit, cursor=cursor, @@ -152796,7 +152796,7 @@ def index_initial_access_git_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIncibeAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -152807,7 +152807,7 @@ def index_initial_access_git_get_without_preload_content( return response_data.response - def _index_initial_access_git_get_serialize( + def _index_incibe_get_serialize( self, page, limit, @@ -152975,7 +152975,7 @@ def _index_initial_access_git_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/initial-access-git', + resource_path='/v3/index/incibe', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -152992,7 +152992,7 @@ def _index_initial_access_git_get_serialize( @validate_call - def index_intel_get( + def index_initial_access_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -153030,10 +153030,10 @@ def index_intel_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryIntelPaginatePagination: - """Return vulnerability data stored in index \"intel\" + ) -> RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination: + """Return vulnerability data stored in index \"initial-access\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the intel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Intel® Product Security Center Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/intel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/intel?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the initial-access index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Initial Access Intelligence ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/initial-access?cursor=` :param page: set the page number of the response :type page: int @@ -153105,7 +153105,7 @@ def index_intel_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_intel_get_serialize( + _param = self._index_initial_access_get_serialize( page=page, limit=limit, cursor=cursor, @@ -153137,7 +153137,7 @@ def index_intel_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIntelPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination", '404': "str", '500': "str", } @@ -153153,7 +153153,7 @@ def index_intel_get( @validate_call - def index_intel_get_with_http_info( + def index_initial_access_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -153191,10 +153191,10 @@ def index_intel_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIntelPaginatePagination]: - """Return vulnerability data stored in index \"intel\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination]: + """Return vulnerability data stored in index \"initial-access\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the intel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Intel® Product Security Center Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/intel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/intel?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the initial-access index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Initial Access Intelligence ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/initial-access?cursor=` :param page: set the page number of the response :type page: int @@ -153266,7 +153266,7 @@ def index_intel_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_intel_get_serialize( + _param = self._index_initial_access_get_serialize( page=page, limit=limit, cursor=cursor, @@ -153298,7 +153298,7 @@ def index_intel_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIntelPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination", '404': "str", '500': "str", } @@ -153314,7 +153314,7 @@ def index_intel_get_with_http_info( @validate_call - def index_intel_get_without_preload_content( + def index_initial_access_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -153353,9 +153353,9 @@ def index_intel_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"intel\" + """Return vulnerability data stored in index \"initial-access\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the intel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Intel® Product Security Center Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/intel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/intel?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the initial-access index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Initial Access Intelligence ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/initial-access?cursor=` :param page: set the page number of the response :type page: int @@ -153427,7 +153427,7 @@ def index_intel_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_intel_get_serialize( + _param = self._index_initial_access_get_serialize( page=page, limit=limit, cursor=cursor, @@ -153459,7 +153459,7 @@ def index_intel_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIntelPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination", '404': "str", '500': "str", } @@ -153470,7 +153470,7 @@ def index_intel_get_without_preload_content( return response_data.response - def _index_intel_get_serialize( + def _index_initial_access_get_serialize( self, page, limit, @@ -153638,7 +153638,7 @@ def _index_intel_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/intel', + resource_path='/v3/index/initial-access', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -153655,7 +153655,7 @@ def _index_intel_get_serialize( @validate_call - def index_ipintel10d_get( + def index_initial_access_git_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -153666,19 +153666,14 @@ def index_ipintel10d_get( cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, + jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, + ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, - cidr: Annotated[Optional[StrictStr], Field(description="Specify an IPv4 or IPv6 CIDR")] = None, - asn: Annotated[Optional[StrictStr], Field(description="Autonomous system number")] = None, - country: Annotated[Optional[StrictStr], Field(description="Country name ISO-3166?? format")] = None, - country_code: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166?? format")] = None, - id: Annotated[Optional[StrictStr], Field(description="Record type")] = None, - kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, - hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, - matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, + published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -153698,10 +153693,10 @@ def index_ipintel10d_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination: - """Return vulnerability data stored in index \"ipintel-10d\" + ) -> RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination: + """Return vulnerability data stored in index \"initial-access-git\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-10d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 10-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-10d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-10d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the initial-access-git index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Initial Access Intelligence Git Backup for Subscribers ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access-git?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/initial-access-git?cursor=` :param page: set the page number of the response :type page: int @@ -153721,6 +153716,10 @@ def index_ipintel10d_get( :type alias: str :param iava: Specify an IAVA ID to search with. :type iava: str + :param jvndb: Specify a JVNDB ID to search with. + :type jvndb: str + :param ilvn: Specify an ILVN ID to search with. + :type ilvn: str :param threat_actor: Specify a threat actor name to search with. :type threat_actor: str :param mitre_id: Specify a MITRE ID to search with. @@ -153731,22 +153730,8 @@ def index_ipintel10d_get( :type ransomware: str :param botnet: Specify a botnet name to search with. :type botnet: str - :param cidr: Specify an IPv4 or IPv6 CIDR - :type cidr: str - :param asn: Autonomous system number - :type asn: str - :param country: Country name ISO-3166?? format - :type country: str - :param country_code: Country code in ISO-3166?? format - :type country_code: str - :param id: Record type - :type id: str - :param kind: Kind of IpIntel Finding - :type kind: str - :param hostname: Match a string in the list of hostnames - :type hostname: str - :param matches: Search for a string in the field describing the finding - :type matches: str + :param published: Specify a published date + :type published: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -153783,7 +153768,7 @@ def index_ipintel10d_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ipintel10d_get_serialize( + _param = self._index_initial_access_git_get_serialize( page=page, limit=limit, cursor=cursor, @@ -153793,19 +153778,14 @@ def index_ipintel10d_get( cve=cve, alias=alias, iava=iava, + jvndb=jvndb, + ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, - cidr=cidr, - asn=asn, - country=country, - country_code=country_code, - id=id, - kind=kind, - hostname=hostname, - matches=matches, + published=published, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -153820,7 +153800,7 @@ def index_ipintel10d_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination", '404': "str", '500': "str", } @@ -153836,7 +153816,7 @@ def index_ipintel10d_get( @validate_call - def index_ipintel10d_get_with_http_info( + def index_initial_access_git_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -153847,19 +153827,14 @@ def index_ipintel10d_get_with_http_info( cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, + jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, + ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, - cidr: Annotated[Optional[StrictStr], Field(description="Specify an IPv4 or IPv6 CIDR")] = None, - asn: Annotated[Optional[StrictStr], Field(description="Autonomous system number")] = None, - country: Annotated[Optional[StrictStr], Field(description="Country name ISO-3166?? format")] = None, - country_code: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166?? format")] = None, - id: Annotated[Optional[StrictStr], Field(description="Record type")] = None, - kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, - hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, - matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, + published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -153879,10 +153854,10 @@ def index_ipintel10d_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination]: - """Return vulnerability data stored in index \"ipintel-10d\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination]: + """Return vulnerability data stored in index \"initial-access-git\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-10d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 10-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-10d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-10d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the initial-access-git index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Initial Access Intelligence Git Backup for Subscribers ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access-git?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/initial-access-git?cursor=` :param page: set the page number of the response :type page: int @@ -153902,6 +153877,10 @@ def index_ipintel10d_get_with_http_info( :type alias: str :param iava: Specify an IAVA ID to search with. :type iava: str + :param jvndb: Specify a JVNDB ID to search with. + :type jvndb: str + :param ilvn: Specify an ILVN ID to search with. + :type ilvn: str :param threat_actor: Specify a threat actor name to search with. :type threat_actor: str :param mitre_id: Specify a MITRE ID to search with. @@ -153912,22 +153891,8 @@ def index_ipintel10d_get_with_http_info( :type ransomware: str :param botnet: Specify a botnet name to search with. :type botnet: str - :param cidr: Specify an IPv4 or IPv6 CIDR - :type cidr: str - :param asn: Autonomous system number - :type asn: str - :param country: Country name ISO-3166?? format - :type country: str - :param country_code: Country code in ISO-3166?? format - :type country_code: str - :param id: Record type - :type id: str - :param kind: Kind of IpIntel Finding - :type kind: str - :param hostname: Match a string in the list of hostnames - :type hostname: str - :param matches: Search for a string in the field describing the finding - :type matches: str + :param published: Specify a published date + :type published: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -153964,7 +153929,7 @@ def index_ipintel10d_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ipintel10d_get_serialize( + _param = self._index_initial_access_git_get_serialize( page=page, limit=limit, cursor=cursor, @@ -153974,19 +153939,14 @@ def index_ipintel10d_get_with_http_info( cve=cve, alias=alias, iava=iava, + jvndb=jvndb, + ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, - cidr=cidr, - asn=asn, - country=country, - country_code=country_code, - id=id, - kind=kind, - hostname=hostname, - matches=matches, + published=published, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -154001,7 +153961,7 @@ def index_ipintel10d_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination", '404': "str", '500': "str", } @@ -154017,7 +153977,7 @@ def index_ipintel10d_get_with_http_info( @validate_call - def index_ipintel10d_get_without_preload_content( + def index_initial_access_git_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -154028,19 +153988,14 @@ def index_ipintel10d_get_without_preload_content( cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, + jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, + ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, - cidr: Annotated[Optional[StrictStr], Field(description="Specify an IPv4 or IPv6 CIDR")] = None, - asn: Annotated[Optional[StrictStr], Field(description="Autonomous system number")] = None, - country: Annotated[Optional[StrictStr], Field(description="Country name ISO-3166?? format")] = None, - country_code: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166?? format")] = None, - id: Annotated[Optional[StrictStr], Field(description="Record type")] = None, - kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, - hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, - matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, + published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -154061,9 +154016,9 @@ def index_ipintel10d_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ipintel-10d\" + """Return vulnerability data stored in index \"initial-access-git\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-10d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 10-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-10d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-10d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the initial-access-git index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Initial Access Intelligence Git Backup for Subscribers ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access-git?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/initial-access-git?cursor=` :param page: set the page number of the response :type page: int @@ -154083,6 +154038,10 @@ def index_ipintel10d_get_without_preload_content( :type alias: str :param iava: Specify an IAVA ID to search with. :type iava: str + :param jvndb: Specify a JVNDB ID to search with. + :type jvndb: str + :param ilvn: Specify an ILVN ID to search with. + :type ilvn: str :param threat_actor: Specify a threat actor name to search with. :type threat_actor: str :param mitre_id: Specify a MITRE ID to search with. @@ -154093,22 +154052,8 @@ def index_ipintel10d_get_without_preload_content( :type ransomware: str :param botnet: Specify a botnet name to search with. :type botnet: str - :param cidr: Specify an IPv4 or IPv6 CIDR - :type cidr: str - :param asn: Autonomous system number - :type asn: str - :param country: Country name ISO-3166?? format - :type country: str - :param country_code: Country code in ISO-3166?? format - :type country_code: str - :param id: Record type - :type id: str - :param kind: Kind of IpIntel Finding - :type kind: str - :param hostname: Match a string in the list of hostnames - :type hostname: str - :param matches: Search for a string in the field describing the finding - :type matches: str + :param published: Specify a published date + :type published: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -154145,7 +154090,7 @@ def index_ipintel10d_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ipintel10d_get_serialize( + _param = self._index_initial_access_git_get_serialize( page=page, limit=limit, cursor=cursor, @@ -154155,19 +154100,14 @@ def index_ipintel10d_get_without_preload_content( cve=cve, alias=alias, iava=iava, + jvndb=jvndb, + ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, - cidr=cidr, - asn=asn, - country=country, - country_code=country_code, - id=id, - kind=kind, - hostname=hostname, - matches=matches, + published=published, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -154182,7 +154122,7 @@ def index_ipintel10d_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination", '404': "str", '500': "str", } @@ -154193,7 +154133,7 @@ def index_ipintel10d_get_without_preload_content( return response_data.response - def _index_ipintel10d_get_serialize( + def _index_initial_access_git_get_serialize( self, page, limit, @@ -154204,19 +154144,14 @@ def _index_ipintel10d_get_serialize( cve, alias, iava, + jvndb, + ilvn, threat_actor, mitre_id, misp_id, ransomware, botnet, - cidr, - asn, - country, - country_code, - id, - kind, - hostname, - matches, + published, date, updated_at_start_date, updated_at_end_date, @@ -154285,6 +154220,14 @@ def _index_ipintel10d_get_serialize( _query_params.append(('iava', iava)) + if jvndb is not None: + + _query_params.append(('jvndb', jvndb)) + + if ilvn is not None: + + _query_params.append(('ilvn', ilvn)) + if threat_actor is not None: _query_params.append(('threat_actor', threat_actor)) @@ -154305,37 +154248,9 @@ def _index_ipintel10d_get_serialize( _query_params.append(('botnet', botnet)) - if cidr is not None: - - _query_params.append(('cidr', cidr)) - - if asn is not None: - - _query_params.append(('asn', asn)) - - if country is not None: - - _query_params.append(('country', country)) - - if country_code is not None: - - _query_params.append(('country_code', country_code)) - - if id is not None: - - _query_params.append(('id', id)) - - if kind is not None: - - _query_params.append(('kind', kind)) - - if hostname is not None: - - _query_params.append(('hostname', hostname)) - - if matches is not None: + if published is not None: - _query_params.append(('matches', matches)) + _query_params.append(('published', published)) if date is not None: @@ -154386,7 +154301,7 @@ def _index_ipintel10d_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ipintel-10d', + resource_path='/v3/index/initial-access-git', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -154403,7 +154318,7 @@ def _index_ipintel10d_get_serialize( @validate_call - def index_ipintel30d_get( + def index_intel_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -154414,19 +154329,14 @@ def index_ipintel30d_get( cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, + jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, + ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, - cidr: Annotated[Optional[StrictStr], Field(description="Specify an IPv4 or IPv6 CIDR")] = None, - asn: Annotated[Optional[StrictStr], Field(description="Autonomous system number")] = None, - country: Annotated[Optional[StrictStr], Field(description="Country name ISO-3166?? format")] = None, - country_code: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166?? format")] = None, - id: Annotated[Optional[StrictStr], Field(description="Record type")] = None, - kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, - hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, - matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, + published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -154446,10 +154356,10 @@ def index_ipintel30d_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination: - """Return vulnerability data stored in index \"ipintel-30d\" + ) -> RenderResponseWithMetadataArrayAdvisoryIntelPaginatePagination: + """Return vulnerability data stored in index \"intel\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-30d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 30-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-30d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-30d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the intel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Intel® Product Security Center Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/intel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/intel?cursor=` :param page: set the page number of the response :type page: int @@ -154469,6 +154379,10 @@ def index_ipintel30d_get( :type alias: str :param iava: Specify an IAVA ID to search with. :type iava: str + :param jvndb: Specify a JVNDB ID to search with. + :type jvndb: str + :param ilvn: Specify an ILVN ID to search with. + :type ilvn: str :param threat_actor: Specify a threat actor name to search with. :type threat_actor: str :param mitre_id: Specify a MITRE ID to search with. @@ -154479,22 +154393,8 @@ def index_ipintel30d_get( :type ransomware: str :param botnet: Specify a botnet name to search with. :type botnet: str - :param cidr: Specify an IPv4 or IPv6 CIDR - :type cidr: str - :param asn: Autonomous system number - :type asn: str - :param country: Country name ISO-3166?? format - :type country: str - :param country_code: Country code in ISO-3166?? format - :type country_code: str - :param id: Record type - :type id: str - :param kind: Kind of IpIntel Finding - :type kind: str - :param hostname: Match a string in the list of hostnames - :type hostname: str - :param matches: Search for a string in the field describing the finding - :type matches: str + :param published: Specify a published date + :type published: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -154531,7 +154431,7 @@ def index_ipintel30d_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ipintel30d_get_serialize( + _param = self._index_intel_get_serialize( page=page, limit=limit, cursor=cursor, @@ -154541,19 +154441,14 @@ def index_ipintel30d_get( cve=cve, alias=alias, iava=iava, + jvndb=jvndb, + ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, - cidr=cidr, - asn=asn, - country=country, - country_code=country_code, - id=id, - kind=kind, - hostname=hostname, - matches=matches, + published=published, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -154568,7 +154463,7 @@ def index_ipintel30d_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIntelPaginatePagination", '404': "str", '500': "str", } @@ -154584,7 +154479,7 @@ def index_ipintel30d_get( @validate_call - def index_ipintel30d_get_with_http_info( + def index_intel_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -154595,19 +154490,14 @@ def index_ipintel30d_get_with_http_info( cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, + jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, + ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, - cidr: Annotated[Optional[StrictStr], Field(description="Specify an IPv4 or IPv6 CIDR")] = None, - asn: Annotated[Optional[StrictStr], Field(description="Autonomous system number")] = None, - country: Annotated[Optional[StrictStr], Field(description="Country name ISO-3166?? format")] = None, - country_code: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166?? format")] = None, - id: Annotated[Optional[StrictStr], Field(description="Record type")] = None, - kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, - hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, - matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, + published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -154627,10 +154517,10 @@ def index_ipintel30d_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination]: - """Return vulnerability data stored in index \"ipintel-30d\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIntelPaginatePagination]: + """Return vulnerability data stored in index \"intel\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-30d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 30-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-30d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-30d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the intel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Intel® Product Security Center Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/intel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/intel?cursor=` :param page: set the page number of the response :type page: int @@ -154650,6 +154540,10 @@ def index_ipintel30d_get_with_http_info( :type alias: str :param iava: Specify an IAVA ID to search with. :type iava: str + :param jvndb: Specify a JVNDB ID to search with. + :type jvndb: str + :param ilvn: Specify an ILVN ID to search with. + :type ilvn: str :param threat_actor: Specify a threat actor name to search with. :type threat_actor: str :param mitre_id: Specify a MITRE ID to search with. @@ -154660,22 +154554,8 @@ def index_ipintel30d_get_with_http_info( :type ransomware: str :param botnet: Specify a botnet name to search with. :type botnet: str - :param cidr: Specify an IPv4 or IPv6 CIDR - :type cidr: str - :param asn: Autonomous system number - :type asn: str - :param country: Country name ISO-3166?? format - :type country: str - :param country_code: Country code in ISO-3166?? format - :type country_code: str - :param id: Record type - :type id: str - :param kind: Kind of IpIntel Finding - :type kind: str - :param hostname: Match a string in the list of hostnames - :type hostname: str - :param matches: Search for a string in the field describing the finding - :type matches: str + :param published: Specify a published date + :type published: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -154712,7 +154592,7 @@ def index_ipintel30d_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ipintel30d_get_serialize( + _param = self._index_intel_get_serialize( page=page, limit=limit, cursor=cursor, @@ -154722,19 +154602,14 @@ def index_ipintel30d_get_with_http_info( cve=cve, alias=alias, iava=iava, + jvndb=jvndb, + ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, - cidr=cidr, - asn=asn, - country=country, - country_code=country_code, - id=id, - kind=kind, - hostname=hostname, - matches=matches, + published=published, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -154749,7 +154624,7 @@ def index_ipintel30d_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIntelPaginatePagination", '404': "str", '500': "str", } @@ -154765,7 +154640,7 @@ def index_ipintel30d_get_with_http_info( @validate_call - def index_ipintel30d_get_without_preload_content( + def index_intel_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -154776,19 +154651,14 @@ def index_ipintel30d_get_without_preload_content( cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, + jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, + ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, - cidr: Annotated[Optional[StrictStr], Field(description="Specify an IPv4 or IPv6 CIDR")] = None, - asn: Annotated[Optional[StrictStr], Field(description="Autonomous system number")] = None, - country: Annotated[Optional[StrictStr], Field(description="Country name ISO-3166?? format")] = None, - country_code: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166?? format")] = None, - id: Annotated[Optional[StrictStr], Field(description="Record type")] = None, - kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, - hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, - matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, + published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -154809,9 +154679,9 @@ def index_ipintel30d_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ipintel-30d\" + """Return vulnerability data stored in index \"intel\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-30d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 30-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-30d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-30d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the intel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Intel® Product Security Center Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/intel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/intel?cursor=` :param page: set the page number of the response :type page: int @@ -154831,6 +154701,10 @@ def index_ipintel30d_get_without_preload_content( :type alias: str :param iava: Specify an IAVA ID to search with. :type iava: str + :param jvndb: Specify a JVNDB ID to search with. + :type jvndb: str + :param ilvn: Specify an ILVN ID to search with. + :type ilvn: str :param threat_actor: Specify a threat actor name to search with. :type threat_actor: str :param mitre_id: Specify a MITRE ID to search with. @@ -154841,22 +154715,8 @@ def index_ipintel30d_get_without_preload_content( :type ransomware: str :param botnet: Specify a botnet name to search with. :type botnet: str - :param cidr: Specify an IPv4 or IPv6 CIDR - :type cidr: str - :param asn: Autonomous system number - :type asn: str - :param country: Country name ISO-3166?? format - :type country: str - :param country_code: Country code in ISO-3166?? format - :type country_code: str - :param id: Record type - :type id: str - :param kind: Kind of IpIntel Finding - :type kind: str - :param hostname: Match a string in the list of hostnames - :type hostname: str - :param matches: Search for a string in the field describing the finding - :type matches: str + :param published: Specify a published date + :type published: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -154893,7 +154753,7 @@ def index_ipintel30d_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ipintel30d_get_serialize( + _param = self._index_intel_get_serialize( page=page, limit=limit, cursor=cursor, @@ -154903,19 +154763,14 @@ def index_ipintel30d_get_without_preload_content( cve=cve, alias=alias, iava=iava, + jvndb=jvndb, + ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, - cidr=cidr, - asn=asn, - country=country, - country_code=country_code, - id=id, - kind=kind, - hostname=hostname, - matches=matches, + published=published, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -154930,7 +154785,7 @@ def index_ipintel30d_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIntelPaginatePagination", '404': "str", '500': "str", } @@ -154941,7 +154796,7 @@ def index_ipintel30d_get_without_preload_content( return response_data.response - def _index_ipintel30d_get_serialize( + def _index_intel_get_serialize( self, page, limit, @@ -154952,19 +154807,14 @@ def _index_ipintel30d_get_serialize( cve, alias, iava, + jvndb, + ilvn, threat_actor, mitre_id, misp_id, ransomware, botnet, - cidr, - asn, - country, - country_code, - id, - kind, - hostname, - matches, + published, date, updated_at_start_date, updated_at_end_date, @@ -155033,6 +154883,14 @@ def _index_ipintel30d_get_serialize( _query_params.append(('iava', iava)) + if jvndb is not None: + + _query_params.append(('jvndb', jvndb)) + + if ilvn is not None: + + _query_params.append(('ilvn', ilvn)) + if threat_actor is not None: _query_params.append(('threat_actor', threat_actor)) @@ -155053,37 +154911,9 @@ def _index_ipintel30d_get_serialize( _query_params.append(('botnet', botnet)) - if cidr is not None: - - _query_params.append(('cidr', cidr)) - - if asn is not None: - - _query_params.append(('asn', asn)) - - if country is not None: - - _query_params.append(('country', country)) - - if country_code is not None: - - _query_params.append(('country_code', country_code)) - - if id is not None: - - _query_params.append(('id', id)) - - if kind is not None: - - _query_params.append(('kind', kind)) - - if hostname is not None: - - _query_params.append(('hostname', hostname)) - - if matches is not None: + if published is not None: - _query_params.append(('matches', matches)) + _query_params.append(('published', published)) if date is not None: @@ -155134,7 +154964,7 @@ def _index_ipintel30d_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ipintel-30d', + resource_path='/v3/index/intel', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -155151,7 +154981,7 @@ def _index_ipintel30d_get_serialize( @validate_call - def index_ipintel3d_get( + def index_ipintel10d_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -155195,9 +155025,9 @@ def index_ipintel3d_get( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination: - """Return vulnerability data stored in index \"ipintel-3d\" + """Return vulnerability data stored in index \"ipintel-10d\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-3d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 3-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-3d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-3d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-10d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 10-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-10d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-10d?cursor=` :param page: set the page number of the response :type page: int @@ -155279,7 +155109,7 @@ def index_ipintel3d_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ipintel3d_get_serialize( + _param = self._index_ipintel10d_get_serialize( page=page, limit=limit, cursor=cursor, @@ -155332,7 +155162,7 @@ def index_ipintel3d_get( @validate_call - def index_ipintel3d_get_with_http_info( + def index_ipintel10d_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -155376,9 +155206,9 @@ def index_ipintel3d_get_with_http_info( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination]: - """Return vulnerability data stored in index \"ipintel-3d\" + """Return vulnerability data stored in index \"ipintel-10d\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-3d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 3-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-3d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-3d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-10d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 10-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-10d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-10d?cursor=` :param page: set the page number of the response :type page: int @@ -155460,7 +155290,7 @@ def index_ipintel3d_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ipintel3d_get_serialize( + _param = self._index_ipintel10d_get_serialize( page=page, limit=limit, cursor=cursor, @@ -155513,7 +155343,7 @@ def index_ipintel3d_get_with_http_info( @validate_call - def index_ipintel3d_get_without_preload_content( + def index_ipintel10d_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -155557,9 +155387,9 @@ def index_ipintel3d_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ipintel-3d\" + """Return vulnerability data stored in index \"ipintel-10d\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-3d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 3-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-3d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-3d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-10d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 10-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-10d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-10d?cursor=` :param page: set the page number of the response :type page: int @@ -155641,7 +155471,7 @@ def index_ipintel3d_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ipintel3d_get_serialize( + _param = self._index_ipintel10d_get_serialize( page=page, limit=limit, cursor=cursor, @@ -155689,7 +155519,7 @@ def index_ipintel3d_get_without_preload_content( return response_data.response - def _index_ipintel3d_get_serialize( + def _index_ipintel10d_get_serialize( self, page, limit, @@ -155882,7 +155712,7 @@ def _index_ipintel3d_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ipintel-3d', + resource_path='/v3/index/ipintel-10d', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -155899,7 +155729,7 @@ def _index_ipintel3d_get_serialize( @validate_call - def index_ipintel90d_get( + def index_ipintel30d_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -155943,9 +155773,9 @@ def index_ipintel90d_get( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination: - """Return vulnerability data stored in index \"ipintel-90d\" + """Return vulnerability data stored in index \"ipintel-30d\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-90d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 90-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-90d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-90d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-30d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 30-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-30d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-30d?cursor=` :param page: set the page number of the response :type page: int @@ -156027,7 +155857,7 @@ def index_ipintel90d_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ipintel90d_get_serialize( + _param = self._index_ipintel30d_get_serialize( page=page, limit=limit, cursor=cursor, @@ -156080,7 +155910,7 @@ def index_ipintel90d_get( @validate_call - def index_ipintel90d_get_with_http_info( + def index_ipintel30d_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -156124,9 +155954,9 @@ def index_ipintel90d_get_with_http_info( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination]: - """Return vulnerability data stored in index \"ipintel-90d\" + """Return vulnerability data stored in index \"ipintel-30d\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-90d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 90-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-90d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-90d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-30d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 30-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-30d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-30d?cursor=` :param page: set the page number of the response :type page: int @@ -156208,7 +156038,7 @@ def index_ipintel90d_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ipintel90d_get_serialize( + _param = self._index_ipintel30d_get_serialize( page=page, limit=limit, cursor=cursor, @@ -156261,7 +156091,7 @@ def index_ipintel90d_get_with_http_info( @validate_call - def index_ipintel90d_get_without_preload_content( + def index_ipintel30d_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -156305,9 +156135,9 @@ def index_ipintel90d_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ipintel-90d\" + """Return vulnerability data stored in index \"ipintel-30d\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-90d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 90-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-90d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-90d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-30d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 30-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-30d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-30d?cursor=` :param page: set the page number of the response :type page: int @@ -156389,7 +156219,7 @@ def index_ipintel90d_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ipintel90d_get_serialize( + _param = self._index_ipintel30d_get_serialize( page=page, limit=limit, cursor=cursor, @@ -156437,7 +156267,7 @@ def index_ipintel90d_get_without_preload_content( return response_data.response - def _index_ipintel90d_get_serialize( + def _index_ipintel30d_get_serialize( self, page, limit, @@ -156630,7 +156460,7 @@ def _index_ipintel90d_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ipintel-90d', + resource_path='/v3/index/ipintel-30d', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -156647,7 +156477,7 @@ def _index_ipintel90d_get_serialize( @validate_call - def index_istio_get( + def index_ipintel3d_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -156658,14 +156488,19 @@ def index_istio_get( cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, - jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, - ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, - published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, + cidr: Annotated[Optional[StrictStr], Field(description="Specify an IPv4 or IPv6 CIDR")] = None, + asn: Annotated[Optional[StrictStr], Field(description="Autonomous system number")] = None, + country: Annotated[Optional[StrictStr], Field(description="Country name ISO-3166?? format")] = None, + country_code: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166?? format")] = None, + id: Annotated[Optional[StrictStr], Field(description="Record type")] = None, + kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, + hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, + matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -156685,10 +156520,10 @@ def index_istio_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryIstioPaginatePagination: - """Return vulnerability data stored in index \"istio\" + ) -> RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination: + """Return vulnerability data stored in index \"ipintel-3d\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the istio index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Istio Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/istio?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/istio?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-3d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 3-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-3d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-3d?cursor=` :param page: set the page number of the response :type page: int @@ -156708,10 +156543,6 @@ def index_istio_get( :type alias: str :param iava: Specify an IAVA ID to search with. :type iava: str - :param jvndb: Specify a JVNDB ID to search with. - :type jvndb: str - :param ilvn: Specify an ILVN ID to search with. - :type ilvn: str :param threat_actor: Specify a threat actor name to search with. :type threat_actor: str :param mitre_id: Specify a MITRE ID to search with. @@ -156722,8 +156553,22 @@ def index_istio_get( :type ransomware: str :param botnet: Specify a botnet name to search with. :type botnet: str - :param published: Specify a published date - :type published: str + :param cidr: Specify an IPv4 or IPv6 CIDR + :type cidr: str + :param asn: Autonomous system number + :type asn: str + :param country: Country name ISO-3166?? format + :type country: str + :param country_code: Country code in ISO-3166?? format + :type country_code: str + :param id: Record type + :type id: str + :param kind: Kind of IpIntel Finding + :type kind: str + :param hostname: Match a string in the list of hostnames + :type hostname: str + :param matches: Search for a string in the field describing the finding + :type matches: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -156760,7 +156605,7 @@ def index_istio_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_istio_get_serialize( + _param = self._index_ipintel3d_get_serialize( page=page, limit=limit, cursor=cursor, @@ -156770,14 +156615,19 @@ def index_istio_get( cve=cve, alias=alias, iava=iava, - jvndb=jvndb, - ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, - published=published, + cidr=cidr, + asn=asn, + country=country, + country_code=country_code, + id=id, + kind=kind, + hostname=hostname, + matches=matches, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -156792,7 +156642,7 @@ def index_istio_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIstioPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination", '404': "str", '500': "str", } @@ -156808,7 +156658,7 @@ def index_istio_get( @validate_call - def index_istio_get_with_http_info( + def index_ipintel3d_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -156819,14 +156669,19 @@ def index_istio_get_with_http_info( cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, - jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, - ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, - published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, + cidr: Annotated[Optional[StrictStr], Field(description="Specify an IPv4 or IPv6 CIDR")] = None, + asn: Annotated[Optional[StrictStr], Field(description="Autonomous system number")] = None, + country: Annotated[Optional[StrictStr], Field(description="Country name ISO-3166?? format")] = None, + country_code: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166?? format")] = None, + id: Annotated[Optional[StrictStr], Field(description="Record type")] = None, + kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, + hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, + matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -156846,10 +156701,10 @@ def index_istio_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIstioPaginatePagination]: - """Return vulnerability data stored in index \"istio\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination]: + """Return vulnerability data stored in index \"ipintel-3d\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the istio index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Istio Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/istio?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/istio?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-3d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 3-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-3d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-3d?cursor=` :param page: set the page number of the response :type page: int @@ -156869,10 +156724,6 @@ def index_istio_get_with_http_info( :type alias: str :param iava: Specify an IAVA ID to search with. :type iava: str - :param jvndb: Specify a JVNDB ID to search with. - :type jvndb: str - :param ilvn: Specify an ILVN ID to search with. - :type ilvn: str :param threat_actor: Specify a threat actor name to search with. :type threat_actor: str :param mitre_id: Specify a MITRE ID to search with. @@ -156883,8 +156734,22 @@ def index_istio_get_with_http_info( :type ransomware: str :param botnet: Specify a botnet name to search with. :type botnet: str - :param published: Specify a published date - :type published: str + :param cidr: Specify an IPv4 or IPv6 CIDR + :type cidr: str + :param asn: Autonomous system number + :type asn: str + :param country: Country name ISO-3166?? format + :type country: str + :param country_code: Country code in ISO-3166?? format + :type country_code: str + :param id: Record type + :type id: str + :param kind: Kind of IpIntel Finding + :type kind: str + :param hostname: Match a string in the list of hostnames + :type hostname: str + :param matches: Search for a string in the field describing the finding + :type matches: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -156921,7 +156786,7 @@ def index_istio_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_istio_get_serialize( + _param = self._index_ipintel3d_get_serialize( page=page, limit=limit, cursor=cursor, @@ -156931,14 +156796,19 @@ def index_istio_get_with_http_info( cve=cve, alias=alias, iava=iava, - jvndb=jvndb, - ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, - published=published, + cidr=cidr, + asn=asn, + country=country, + country_code=country_code, + id=id, + kind=kind, + hostname=hostname, + matches=matches, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -156953,7 +156823,7 @@ def index_istio_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIstioPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination", '404': "str", '500': "str", } @@ -156969,7 +156839,7 @@ def index_istio_get_with_http_info( @validate_call - def index_istio_get_without_preload_content( + def index_ipintel3d_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -156980,14 +156850,19 @@ def index_istio_get_without_preload_content( cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, - jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, - ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, - published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, + cidr: Annotated[Optional[StrictStr], Field(description="Specify an IPv4 or IPv6 CIDR")] = None, + asn: Annotated[Optional[StrictStr], Field(description="Autonomous system number")] = None, + country: Annotated[Optional[StrictStr], Field(description="Country name ISO-3166?? format")] = None, + country_code: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166?? format")] = None, + id: Annotated[Optional[StrictStr], Field(description="Record type")] = None, + kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, + hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, + matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -157008,9 +156883,9 @@ def index_istio_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"istio\" + """Return vulnerability data stored in index \"ipintel-3d\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the istio index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Istio Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/istio?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/istio?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-3d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 3-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-3d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-3d?cursor=` :param page: set the page number of the response :type page: int @@ -157030,10 +156905,6 @@ def index_istio_get_without_preload_content( :type alias: str :param iava: Specify an IAVA ID to search with. :type iava: str - :param jvndb: Specify a JVNDB ID to search with. - :type jvndb: str - :param ilvn: Specify an ILVN ID to search with. - :type ilvn: str :param threat_actor: Specify a threat actor name to search with. :type threat_actor: str :param mitre_id: Specify a MITRE ID to search with. @@ -157044,8 +156915,22 @@ def index_istio_get_without_preload_content( :type ransomware: str :param botnet: Specify a botnet name to search with. :type botnet: str - :param published: Specify a published date - :type published: str + :param cidr: Specify an IPv4 or IPv6 CIDR + :type cidr: str + :param asn: Autonomous system number + :type asn: str + :param country: Country name ISO-3166?? format + :type country: str + :param country_code: Country code in ISO-3166?? format + :type country_code: str + :param id: Record type + :type id: str + :param kind: Kind of IpIntel Finding + :type kind: str + :param hostname: Match a string in the list of hostnames + :type hostname: str + :param matches: Search for a string in the field describing the finding + :type matches: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -157082,7 +156967,7 @@ def index_istio_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_istio_get_serialize( + _param = self._index_ipintel3d_get_serialize( page=page, limit=limit, cursor=cursor, @@ -157092,14 +156977,19 @@ def index_istio_get_without_preload_content( cve=cve, alias=alias, iava=iava, - jvndb=jvndb, - ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, - published=published, + cidr=cidr, + asn=asn, + country=country, + country_code=country_code, + id=id, + kind=kind, + hostname=hostname, + matches=matches, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -157114,7 +157004,7 @@ def index_istio_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIstioPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination", '404': "str", '500': "str", } @@ -157125,7 +157015,7 @@ def index_istio_get_without_preload_content( return response_data.response - def _index_istio_get_serialize( + def _index_ipintel3d_get_serialize( self, page, limit, @@ -157136,14 +157026,19 @@ def _index_istio_get_serialize( cve, alias, iava, - jvndb, - ilvn, threat_actor, mitre_id, misp_id, ransomware, botnet, - published, + cidr, + asn, + country, + country_code, + id, + kind, + hostname, + matches, date, updated_at_start_date, updated_at_end_date, @@ -157212,14 +157107,6 @@ def _index_istio_get_serialize( _query_params.append(('iava', iava)) - if jvndb is not None: - - _query_params.append(('jvndb', jvndb)) - - if ilvn is not None: - - _query_params.append(('ilvn', ilvn)) - if threat_actor is not None: _query_params.append(('threat_actor', threat_actor)) @@ -157240,9 +157127,37 @@ def _index_istio_get_serialize( _query_params.append(('botnet', botnet)) - if published is not None: + if cidr is not None: - _query_params.append(('published', published)) + _query_params.append(('cidr', cidr)) + + if asn is not None: + + _query_params.append(('asn', asn)) + + if country is not None: + + _query_params.append(('country', country)) + + if country_code is not None: + + _query_params.append(('country_code', country_code)) + + if id is not None: + + _query_params.append(('id', id)) + + if kind is not None: + + _query_params.append(('kind', kind)) + + if hostname is not None: + + _query_params.append(('hostname', hostname)) + + if matches is not None: + + _query_params.append(('matches', matches)) if date is not None: @@ -157293,7 +157208,7 @@ def _index_istio_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/istio', + resource_path='/v3/index/ipintel-3d', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -157310,7 +157225,7 @@ def _index_istio_get_serialize( @validate_call - def index_ivanti_get( + def index_ipintel90d_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -157321,14 +157236,19 @@ def index_ivanti_get( cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, - jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, - ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, - published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, + cidr: Annotated[Optional[StrictStr], Field(description="Specify an IPv4 or IPv6 CIDR")] = None, + asn: Annotated[Optional[StrictStr], Field(description="Autonomous system number")] = None, + country: Annotated[Optional[StrictStr], Field(description="Country name ISO-3166?? format")] = None, + country_code: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166?? format")] = None, + id: Annotated[Optional[StrictStr], Field(description="Record type")] = None, + kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, + hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, + matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -157348,10 +157268,10 @@ def index_ivanti_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryIvantiPaginatePagination: - """Return vulnerability data stored in index \"ivanti\" + ) -> RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination: + """Return vulnerability data stored in index \"ipintel-90d\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ivanti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ivanti Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ivanti?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-90d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 90-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-90d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-90d?cursor=` :param page: set the page number of the response :type page: int @@ -157371,10 +157291,6 @@ def index_ivanti_get( :type alias: str :param iava: Specify an IAVA ID to search with. :type iava: str - :param jvndb: Specify a JVNDB ID to search with. - :type jvndb: str - :param ilvn: Specify an ILVN ID to search with. - :type ilvn: str :param threat_actor: Specify a threat actor name to search with. :type threat_actor: str :param mitre_id: Specify a MITRE ID to search with. @@ -157385,8 +157301,22 @@ def index_ivanti_get( :type ransomware: str :param botnet: Specify a botnet name to search with. :type botnet: str - :param published: Specify a published date - :type published: str + :param cidr: Specify an IPv4 or IPv6 CIDR + :type cidr: str + :param asn: Autonomous system number + :type asn: str + :param country: Country name ISO-3166?? format + :type country: str + :param country_code: Country code in ISO-3166?? format + :type country_code: str + :param id: Record type + :type id: str + :param kind: Kind of IpIntel Finding + :type kind: str + :param hostname: Match a string in the list of hostnames + :type hostname: str + :param matches: Search for a string in the field describing the finding + :type matches: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -157423,7 +157353,7 @@ def index_ivanti_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ivanti_get_serialize( + _param = self._index_ipintel90d_get_serialize( page=page, limit=limit, cursor=cursor, @@ -157433,14 +157363,19 @@ def index_ivanti_get( cve=cve, alias=alias, iava=iava, - jvndb=jvndb, - ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, - published=published, + cidr=cidr, + asn=asn, + country=country, + country_code=country_code, + id=id, + kind=kind, + hostname=hostname, + matches=matches, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -157455,7 +157390,7 @@ def index_ivanti_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIvantiPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination", '404': "str", '500': "str", } @@ -157471,7 +157406,7 @@ def index_ivanti_get( @validate_call - def index_ivanti_get_with_http_info( + def index_ipintel90d_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -157482,14 +157417,19 @@ def index_ivanti_get_with_http_info( cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, - jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, - ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, - published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, + cidr: Annotated[Optional[StrictStr], Field(description="Specify an IPv4 or IPv6 CIDR")] = None, + asn: Annotated[Optional[StrictStr], Field(description="Autonomous system number")] = None, + country: Annotated[Optional[StrictStr], Field(description="Country name ISO-3166?? format")] = None, + country_code: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166?? format")] = None, + id: Annotated[Optional[StrictStr], Field(description="Record type")] = None, + kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, + hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, + matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -157509,10 +157449,10 @@ def index_ivanti_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIvantiPaginatePagination]: - """Return vulnerability data stored in index \"ivanti\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination]: + """Return vulnerability data stored in index \"ipintel-90d\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ivanti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ivanti Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ivanti?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-90d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 90-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-90d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-90d?cursor=` :param page: set the page number of the response :type page: int @@ -157532,10 +157472,6 @@ def index_ivanti_get_with_http_info( :type alias: str :param iava: Specify an IAVA ID to search with. :type iava: str - :param jvndb: Specify a JVNDB ID to search with. - :type jvndb: str - :param ilvn: Specify an ILVN ID to search with. - :type ilvn: str :param threat_actor: Specify a threat actor name to search with. :type threat_actor: str :param mitre_id: Specify a MITRE ID to search with. @@ -157546,8 +157482,22 @@ def index_ivanti_get_with_http_info( :type ransomware: str :param botnet: Specify a botnet name to search with. :type botnet: str - :param published: Specify a published date - :type published: str + :param cidr: Specify an IPv4 or IPv6 CIDR + :type cidr: str + :param asn: Autonomous system number + :type asn: str + :param country: Country name ISO-3166?? format + :type country: str + :param country_code: Country code in ISO-3166?? format + :type country_code: str + :param id: Record type + :type id: str + :param kind: Kind of IpIntel Finding + :type kind: str + :param hostname: Match a string in the list of hostnames + :type hostname: str + :param matches: Search for a string in the field describing the finding + :type matches: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -157584,7 +157534,7 @@ def index_ivanti_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ivanti_get_serialize( + _param = self._index_ipintel90d_get_serialize( page=page, limit=limit, cursor=cursor, @@ -157594,14 +157544,19 @@ def index_ivanti_get_with_http_info( cve=cve, alias=alias, iava=iava, - jvndb=jvndb, - ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, - published=published, + cidr=cidr, + asn=asn, + country=country, + country_code=country_code, + id=id, + kind=kind, + hostname=hostname, + matches=matches, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -157616,7 +157571,7 @@ def index_ivanti_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIvantiPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination", '404': "str", '500': "str", } @@ -157632,7 +157587,7 @@ def index_ivanti_get_with_http_info( @validate_call - def index_ivanti_get_without_preload_content( + def index_ipintel90d_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -157643,14 +157598,19 @@ def index_ivanti_get_without_preload_content( cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, - jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, - ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, - published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, + cidr: Annotated[Optional[StrictStr], Field(description="Specify an IPv4 or IPv6 CIDR")] = None, + asn: Annotated[Optional[StrictStr], Field(description="Autonomous system number")] = None, + country: Annotated[Optional[StrictStr], Field(description="Country name ISO-3166?? format")] = None, + country_code: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166?? format")] = None, + id: Annotated[Optional[StrictStr], Field(description="Record type")] = None, + kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, + hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, + matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -157671,9 +157631,9 @@ def index_ivanti_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ivanti\" + """Return vulnerability data stored in index \"ipintel-90d\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ivanti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ivanti Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ivanti?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ipintel-90d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 90-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-90d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ipintel-90d?cursor=` :param page: set the page number of the response :type page: int @@ -157693,10 +157653,6 @@ def index_ivanti_get_without_preload_content( :type alias: str :param iava: Specify an IAVA ID to search with. :type iava: str - :param jvndb: Specify a JVNDB ID to search with. - :type jvndb: str - :param ilvn: Specify an ILVN ID to search with. - :type ilvn: str :param threat_actor: Specify a threat actor name to search with. :type threat_actor: str :param mitre_id: Specify a MITRE ID to search with. @@ -157707,8 +157663,22 @@ def index_ivanti_get_without_preload_content( :type ransomware: str :param botnet: Specify a botnet name to search with. :type botnet: str - :param published: Specify a published date - :type published: str + :param cidr: Specify an IPv4 or IPv6 CIDR + :type cidr: str + :param asn: Autonomous system number + :type asn: str + :param country: Country name ISO-3166?? format + :type country: str + :param country_code: Country code in ISO-3166?? format + :type country_code: str + :param id: Record type + :type id: str + :param kind: Kind of IpIntel Finding + :type kind: str + :param hostname: Match a string in the list of hostnames + :type hostname: str + :param matches: Search for a string in the field describing the finding + :type matches: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -157745,7 +157715,7 @@ def index_ivanti_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ivanti_get_serialize( + _param = self._index_ipintel90d_get_serialize( page=page, limit=limit, cursor=cursor, @@ -157755,14 +157725,19 @@ def index_ivanti_get_without_preload_content( cve=cve, alias=alias, iava=iava, - jvndb=jvndb, - ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, - published=published, + cidr=cidr, + asn=asn, + country=country, + country_code=country_code, + id=id, + kind=kind, + hostname=hostname, + matches=matches, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -157777,7 +157752,7 @@ def index_ivanti_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIvantiPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination", '404': "str", '500': "str", } @@ -157788,7 +157763,7 @@ def index_ivanti_get_without_preload_content( return response_data.response - def _index_ivanti_get_serialize( + def _index_ipintel90d_get_serialize( self, page, limit, @@ -157799,14 +157774,19 @@ def _index_ivanti_get_serialize( cve, alias, iava, - jvndb, - ilvn, threat_actor, mitre_id, misp_id, ransomware, botnet, - published, + cidr, + asn, + country, + country_code, + id, + kind, + hostname, + matches, date, updated_at_start_date, updated_at_end_date, @@ -157875,14 +157855,6 @@ def _index_ivanti_get_serialize( _query_params.append(('iava', iava)) - if jvndb is not None: - - _query_params.append(('jvndb', jvndb)) - - if ilvn is not None: - - _query_params.append(('ilvn', ilvn)) - if threat_actor is not None: _query_params.append(('threat_actor', threat_actor)) @@ -157903,9 +157875,37 @@ def _index_ivanti_get_serialize( _query_params.append(('botnet', botnet)) - if published is not None: + if cidr is not None: - _query_params.append(('published', published)) + _query_params.append(('cidr', cidr)) + + if asn is not None: + + _query_params.append(('asn', asn)) + + if country is not None: + + _query_params.append(('country', country)) + + if country_code is not None: + + _query_params.append(('country_code', country_code)) + + if id is not None: + + _query_params.append(('id', id)) + + if kind is not None: + + _query_params.append(('kind', kind)) + + if hostname is not None: + + _query_params.append(('hostname', hostname)) + + if matches is not None: + + _query_params.append(('matches', matches)) if date is not None: @@ -157956,7 +157956,7 @@ def _index_ivanti_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ivanti', + resource_path='/v3/index/ipintel-90d', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -157973,7 +157973,7 @@ def _index_ivanti_get_serialize( @validate_call - def index_ivanti_rss_get( + def index_istio_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -158011,10 +158011,10 @@ def index_ivanti_rss_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryIvantiRSSPaginatePagination: - """Return vulnerability data stored in index \"ivanti-rss\" + ) -> RenderResponseWithMetadataArrayAdvisoryIstioPaginatePagination: + """Return vulnerability data stored in index \"istio\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ivanti-rss index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ivanti Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti-rss?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ivanti-rss?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the istio index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Istio Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/istio?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/istio?cursor=` :param page: set the page number of the response :type page: int @@ -158086,7 +158086,7 @@ def index_ivanti_rss_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ivanti_rss_get_serialize( + _param = self._index_istio_get_serialize( page=page, limit=limit, cursor=cursor, @@ -158118,7 +158118,7 @@ def index_ivanti_rss_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIvantiRSSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIstioPaginatePagination", '404': "str", '500': "str", } @@ -158134,7 +158134,7 @@ def index_ivanti_rss_get( @validate_call - def index_ivanti_rss_get_with_http_info( + def index_istio_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -158172,10 +158172,10 @@ def index_ivanti_rss_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIvantiRSSPaginatePagination]: - """Return vulnerability data stored in index \"ivanti-rss\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIstioPaginatePagination]: + """Return vulnerability data stored in index \"istio\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ivanti-rss index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ivanti Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti-rss?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ivanti-rss?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the istio index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Istio Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/istio?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/istio?cursor=` :param page: set the page number of the response :type page: int @@ -158247,7 +158247,7 @@ def index_ivanti_rss_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ivanti_rss_get_serialize( + _param = self._index_istio_get_serialize( page=page, limit=limit, cursor=cursor, @@ -158279,7 +158279,7 @@ def index_ivanti_rss_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIvantiRSSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIstioPaginatePagination", '404': "str", '500': "str", } @@ -158295,7 +158295,7 @@ def index_ivanti_rss_get_with_http_info( @validate_call - def index_ivanti_rss_get_without_preload_content( + def index_istio_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -158334,9 +158334,9 @@ def index_ivanti_rss_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ivanti-rss\" + """Return vulnerability data stored in index \"istio\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ivanti-rss index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ivanti Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti-rss?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ivanti-rss?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the istio index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Istio Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/istio?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/istio?cursor=` :param page: set the page number of the response :type page: int @@ -158408,7 +158408,7 @@ def index_ivanti_rss_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ivanti_rss_get_serialize( + _param = self._index_istio_get_serialize( page=page, limit=limit, cursor=cursor, @@ -158440,7 +158440,7 @@ def index_ivanti_rss_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryIvantiRSSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIstioPaginatePagination", '404': "str", '500': "str", } @@ -158451,7 +158451,7 @@ def index_ivanti_rss_get_without_preload_content( return response_data.response - def _index_ivanti_rss_get_serialize( + def _index_istio_get_serialize( self, page, limit, @@ -158619,7 +158619,7 @@ def _index_ivanti_rss_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ivanti-rss', + resource_path='/v3/index/istio', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -158636,7 +158636,7 @@ def _index_ivanti_rss_get_serialize( @validate_call - def index_jenkins_get( + def index_ivanti_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -158674,10 +158674,10 @@ def index_jenkins_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryJenkinsPaginatePagination: - """Return vulnerability data stored in index \"jenkins\" + ) -> RenderResponseWithMetadataArrayAdvisoryIvantiPaginatePagination: + """Return vulnerability data stored in index \"ivanti\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jenkins index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Jenkins Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jenkins?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jenkins?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ivanti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ivanti Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ivanti?cursor=` :param page: set the page number of the response :type page: int @@ -158749,7 +158749,7 @@ def index_jenkins_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jenkins_get_serialize( + _param = self._index_ivanti_get_serialize( page=page, limit=limit, cursor=cursor, @@ -158781,7 +158781,7 @@ def index_jenkins_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJenkinsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIvantiPaginatePagination", '404': "str", '500': "str", } @@ -158797,7 +158797,7 @@ def index_jenkins_get( @validate_call - def index_jenkins_get_with_http_info( + def index_ivanti_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -158835,10 +158835,10 @@ def index_jenkins_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJenkinsPaginatePagination]: - """Return vulnerability data stored in index \"jenkins\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIvantiPaginatePagination]: + """Return vulnerability data stored in index \"ivanti\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jenkins index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Jenkins Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jenkins?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jenkins?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ivanti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ivanti Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ivanti?cursor=` :param page: set the page number of the response :type page: int @@ -158910,7 +158910,7 @@ def index_jenkins_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jenkins_get_serialize( + _param = self._index_ivanti_get_serialize( page=page, limit=limit, cursor=cursor, @@ -158942,7 +158942,7 @@ def index_jenkins_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJenkinsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIvantiPaginatePagination", '404': "str", '500': "str", } @@ -158958,7 +158958,7 @@ def index_jenkins_get_with_http_info( @validate_call - def index_jenkins_get_without_preload_content( + def index_ivanti_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -158997,9 +158997,9 @@ def index_jenkins_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"jenkins\" + """Return vulnerability data stored in index \"ivanti\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jenkins index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Jenkins Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jenkins?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jenkins?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ivanti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ivanti Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ivanti?cursor=` :param page: set the page number of the response :type page: int @@ -159071,7 +159071,7 @@ def index_jenkins_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jenkins_get_serialize( + _param = self._index_ivanti_get_serialize( page=page, limit=limit, cursor=cursor, @@ -159103,7 +159103,7 @@ def index_jenkins_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJenkinsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIvantiPaginatePagination", '404': "str", '500': "str", } @@ -159114,7 +159114,7 @@ def index_jenkins_get_without_preload_content( return response_data.response - def _index_jenkins_get_serialize( + def _index_ivanti_get_serialize( self, page, limit, @@ -159282,7 +159282,7 @@ def _index_jenkins_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/jenkins', + resource_path='/v3/index/ivanti', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -159299,7 +159299,7 @@ def _index_jenkins_get_serialize( @validate_call - def index_jetbrains_get( + def index_ivanti_rss_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -159337,10 +159337,10 @@ def index_jetbrains_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryJetBrainsPaginatePagination: - """Return vulnerability data stored in index \"jetbrains\" + ) -> RenderResponseWithMetadataArrayAdvisoryIvantiRSSPaginatePagination: + """Return vulnerability data stored in index \"ivanti-rss\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jetbrains index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** JetBrains Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jetbrains?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jetbrains?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ivanti-rss index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ivanti Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti-rss?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ivanti-rss?cursor=` :param page: set the page number of the response :type page: int @@ -159412,7 +159412,7 @@ def index_jetbrains_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jetbrains_get_serialize( + _param = self._index_ivanti_rss_get_serialize( page=page, limit=limit, cursor=cursor, @@ -159444,7 +159444,7 @@ def index_jetbrains_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJetBrainsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIvantiRSSPaginatePagination", '404': "str", '500': "str", } @@ -159460,7 +159460,7 @@ def index_jetbrains_get( @validate_call - def index_jetbrains_get_with_http_info( + def index_ivanti_rss_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -159498,10 +159498,10 @@ def index_jetbrains_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJetBrainsPaginatePagination]: - """Return vulnerability data stored in index \"jetbrains\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryIvantiRSSPaginatePagination]: + """Return vulnerability data stored in index \"ivanti-rss\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jetbrains index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** JetBrains Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jetbrains?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jetbrains?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ivanti-rss index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ivanti Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti-rss?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ivanti-rss?cursor=` :param page: set the page number of the response :type page: int @@ -159573,7 +159573,7 @@ def index_jetbrains_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jetbrains_get_serialize( + _param = self._index_ivanti_rss_get_serialize( page=page, limit=limit, cursor=cursor, @@ -159605,7 +159605,7 @@ def index_jetbrains_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJetBrainsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIvantiRSSPaginatePagination", '404': "str", '500': "str", } @@ -159621,7 +159621,7 @@ def index_jetbrains_get_with_http_info( @validate_call - def index_jetbrains_get_without_preload_content( + def index_ivanti_rss_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -159660,9 +159660,9 @@ def index_jetbrains_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"jetbrains\" + """Return vulnerability data stored in index \"ivanti-rss\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jetbrains index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** JetBrains Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jetbrains?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jetbrains?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ivanti-rss index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ivanti Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti-rss?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ivanti-rss?cursor=` :param page: set the page number of the response :type page: int @@ -159734,7 +159734,7 @@ def index_jetbrains_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jetbrains_get_serialize( + _param = self._index_ivanti_rss_get_serialize( page=page, limit=limit, cursor=cursor, @@ -159766,7 +159766,7 @@ def index_jetbrains_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJetBrainsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryIvantiRSSPaginatePagination", '404': "str", '500': "str", } @@ -159777,7 +159777,7 @@ def index_jetbrains_get_without_preload_content( return response_data.response - def _index_jetbrains_get_serialize( + def _index_ivanti_rss_get_serialize( self, page, limit, @@ -159945,7 +159945,7 @@ def _index_jetbrains_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/jetbrains', + resource_path='/v3/index/ivanti-rss', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -159962,7 +159962,7 @@ def _index_jetbrains_get_serialize( @validate_call - def index_jfrog_get( + def index_jenkins_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -160000,10 +160000,10 @@ def index_jfrog_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryJFrogPaginatePagination: - """Return vulnerability data stored in index \"jfrog\" + ) -> RenderResponseWithMetadataArrayAdvisoryJenkinsPaginatePagination: + """Return vulnerability data stored in index \"jenkins\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jfrog index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** JFrog Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jfrog?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jfrog?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jenkins index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Jenkins Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jenkins?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jenkins?cursor=` :param page: set the page number of the response :type page: int @@ -160075,7 +160075,7 @@ def index_jfrog_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jfrog_get_serialize( + _param = self._index_jenkins_get_serialize( page=page, limit=limit, cursor=cursor, @@ -160107,7 +160107,7 @@ def index_jfrog_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJFrogPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJenkinsPaginatePagination", '404': "str", '500': "str", } @@ -160123,7 +160123,7 @@ def index_jfrog_get( @validate_call - def index_jfrog_get_with_http_info( + def index_jenkins_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -160161,10 +160161,10 @@ def index_jfrog_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJFrogPaginatePagination]: - """Return vulnerability data stored in index \"jfrog\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJenkinsPaginatePagination]: + """Return vulnerability data stored in index \"jenkins\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jfrog index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** JFrog Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jfrog?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jfrog?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jenkins index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Jenkins Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jenkins?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jenkins?cursor=` :param page: set the page number of the response :type page: int @@ -160236,7 +160236,7 @@ def index_jfrog_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jfrog_get_serialize( + _param = self._index_jenkins_get_serialize( page=page, limit=limit, cursor=cursor, @@ -160268,7 +160268,7 @@ def index_jfrog_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJFrogPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJenkinsPaginatePagination", '404': "str", '500': "str", } @@ -160284,7 +160284,7 @@ def index_jfrog_get_with_http_info( @validate_call - def index_jfrog_get_without_preload_content( + def index_jenkins_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -160323,9 +160323,9 @@ def index_jfrog_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"jfrog\" + """Return vulnerability data stored in index \"jenkins\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jfrog index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** JFrog Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jfrog?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jfrog?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jenkins index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Jenkins Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jenkins?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jenkins?cursor=` :param page: set the page number of the response :type page: int @@ -160397,7 +160397,7 @@ def index_jfrog_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jfrog_get_serialize( + _param = self._index_jenkins_get_serialize( page=page, limit=limit, cursor=cursor, @@ -160429,7 +160429,7 @@ def index_jfrog_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJFrogPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJenkinsPaginatePagination", '404': "str", '500': "str", } @@ -160440,7 +160440,7 @@ def index_jfrog_get_without_preload_content( return response_data.response - def _index_jfrog_get_serialize( + def _index_jenkins_get_serialize( self, page, limit, @@ -160608,7 +160608,7 @@ def _index_jfrog_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/jfrog', + resource_path='/v3/index/jenkins', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -160625,7 +160625,7 @@ def _index_jfrog_get_serialize( @validate_call - def index_jnj_get( + def index_jetbrains_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -160663,10 +160663,10 @@ def index_jnj_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryJNJAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"jnj\" + ) -> RenderResponseWithMetadataArrayAdvisoryJetBrainsPaginatePagination: + """Return vulnerability data stored in index \"jetbrains\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jnj index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Johnson & Johnson Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jnj?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jnj?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jetbrains index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** JetBrains Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jetbrains?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jetbrains?cursor=` :param page: set the page number of the response :type page: int @@ -160738,7 +160738,7 @@ def index_jnj_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jnj_get_serialize( + _param = self._index_jetbrains_get_serialize( page=page, limit=limit, cursor=cursor, @@ -160770,7 +160770,7 @@ def index_jnj_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJNJAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJetBrainsPaginatePagination", '404': "str", '500': "str", } @@ -160786,7 +160786,7 @@ def index_jnj_get( @validate_call - def index_jnj_get_with_http_info( + def index_jetbrains_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -160824,10 +160824,10 @@ def index_jnj_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJNJAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"jnj\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJetBrainsPaginatePagination]: + """Return vulnerability data stored in index \"jetbrains\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jnj index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Johnson & Johnson Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jnj?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jnj?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jetbrains index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** JetBrains Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jetbrains?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jetbrains?cursor=` :param page: set the page number of the response :type page: int @@ -160899,7 +160899,7 @@ def index_jnj_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jnj_get_serialize( + _param = self._index_jetbrains_get_serialize( page=page, limit=limit, cursor=cursor, @@ -160931,7 +160931,7 @@ def index_jnj_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJNJAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJetBrainsPaginatePagination", '404': "str", '500': "str", } @@ -160947,7 +160947,7 @@ def index_jnj_get_with_http_info( @validate_call - def index_jnj_get_without_preload_content( + def index_jetbrains_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -160986,9 +160986,9 @@ def index_jnj_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"jnj\" + """Return vulnerability data stored in index \"jetbrains\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jnj index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Johnson & Johnson Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jnj?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jnj?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jetbrains index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** JetBrains Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jetbrains?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jetbrains?cursor=` :param page: set the page number of the response :type page: int @@ -161060,7 +161060,7 @@ def index_jnj_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jnj_get_serialize( + _param = self._index_jetbrains_get_serialize( page=page, limit=limit, cursor=cursor, @@ -161092,7 +161092,7 @@ def index_jnj_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJNJAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJetBrainsPaginatePagination", '404': "str", '500': "str", } @@ -161103,7 +161103,7 @@ def index_jnj_get_without_preload_content( return response_data.response - def _index_jnj_get_serialize( + def _index_jetbrains_get_serialize( self, page, limit, @@ -161271,7 +161271,7 @@ def _index_jnj_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/jnj', + resource_path='/v3/index/jetbrains', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -161288,7 +161288,7 @@ def _index_jnj_get_serialize( @validate_call - def index_johnson_controls_get( + def index_jfrog_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -161326,10 +161326,10 @@ def index_johnson_controls_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryJohnsonControlsPaginatePagination: - """Return vulnerability data stored in index \"johnson-controls\" + ) -> RenderResponseWithMetadataArrayAdvisoryJFrogPaginatePagination: + """Return vulnerability data stored in index \"jfrog\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the johnson-controls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Security Advisories - Johnson Controls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/johnson-controls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/johnson-controls?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jfrog index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** JFrog Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jfrog?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jfrog?cursor=` :param page: set the page number of the response :type page: int @@ -161401,7 +161401,7 @@ def index_johnson_controls_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_johnson_controls_get_serialize( + _param = self._index_jfrog_get_serialize( page=page, limit=limit, cursor=cursor, @@ -161433,7 +161433,7 @@ def index_johnson_controls_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJohnsonControlsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJFrogPaginatePagination", '404': "str", '500': "str", } @@ -161449,7 +161449,7 @@ def index_johnson_controls_get( @validate_call - def index_johnson_controls_get_with_http_info( + def index_jfrog_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -161487,10 +161487,10 @@ def index_johnson_controls_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJohnsonControlsPaginatePagination]: - """Return vulnerability data stored in index \"johnson-controls\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJFrogPaginatePagination]: + """Return vulnerability data stored in index \"jfrog\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the johnson-controls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Security Advisories - Johnson Controls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/johnson-controls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/johnson-controls?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jfrog index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** JFrog Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jfrog?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jfrog?cursor=` :param page: set the page number of the response :type page: int @@ -161562,7 +161562,7 @@ def index_johnson_controls_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_johnson_controls_get_serialize( + _param = self._index_jfrog_get_serialize( page=page, limit=limit, cursor=cursor, @@ -161594,7 +161594,7 @@ def index_johnson_controls_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJohnsonControlsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJFrogPaginatePagination", '404': "str", '500': "str", } @@ -161610,7 +161610,7 @@ def index_johnson_controls_get_with_http_info( @validate_call - def index_johnson_controls_get_without_preload_content( + def index_jfrog_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -161649,9 +161649,9 @@ def index_johnson_controls_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"johnson-controls\" + """Return vulnerability data stored in index \"jfrog\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the johnson-controls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Security Advisories - Johnson Controls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/johnson-controls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/johnson-controls?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jfrog index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** JFrog Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jfrog?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jfrog?cursor=` :param page: set the page number of the response :type page: int @@ -161723,7 +161723,7 @@ def index_johnson_controls_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_johnson_controls_get_serialize( + _param = self._index_jfrog_get_serialize( page=page, limit=limit, cursor=cursor, @@ -161755,7 +161755,7 @@ def index_johnson_controls_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJohnsonControlsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJFrogPaginatePagination", '404': "str", '500': "str", } @@ -161766,7 +161766,7 @@ def index_johnson_controls_get_without_preload_content( return response_data.response - def _index_johnson_controls_get_serialize( + def _index_jfrog_get_serialize( self, page, limit, @@ -161934,7 +161934,7 @@ def _index_johnson_controls_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/johnson-controls', + resource_path='/v3/index/jfrog', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -161951,7 +161951,7 @@ def _index_johnson_controls_get_serialize( @validate_call - def index_juniper_get( + def index_jnj_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -161989,10 +161989,10 @@ def index_juniper_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryJuniperPaginatePagination: - """Return vulnerability data stored in index \"juniper\" + ) -> RenderResponseWithMetadataArrayAdvisoryJNJAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"jnj\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the juniper index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Juniper Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/juniper?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/juniper?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jnj index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Johnson & Johnson Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jnj?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jnj?cursor=` :param page: set the page number of the response :type page: int @@ -162064,7 +162064,7 @@ def index_juniper_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_juniper_get_serialize( + _param = self._index_jnj_get_serialize( page=page, limit=limit, cursor=cursor, @@ -162096,7 +162096,7 @@ def index_juniper_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJuniperPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJNJAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -162112,7 +162112,7 @@ def index_juniper_get( @validate_call - def index_juniper_get_with_http_info( + def index_jnj_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -162150,10 +162150,10 @@ def index_juniper_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJuniperPaginatePagination]: - """Return vulnerability data stored in index \"juniper\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJNJAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"jnj\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the juniper index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Juniper Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/juniper?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/juniper?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jnj index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Johnson & Johnson Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jnj?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jnj?cursor=` :param page: set the page number of the response :type page: int @@ -162225,7 +162225,7 @@ def index_juniper_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_juniper_get_serialize( + _param = self._index_jnj_get_serialize( page=page, limit=limit, cursor=cursor, @@ -162257,7 +162257,7 @@ def index_juniper_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJuniperPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJNJAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -162273,7 +162273,7 @@ def index_juniper_get_with_http_info( @validate_call - def index_juniper_get_without_preload_content( + def index_jnj_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -162312,9 +162312,9 @@ def index_juniper_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"juniper\" + """Return vulnerability data stored in index \"jnj\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the juniper index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Juniper Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/juniper?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/juniper?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jnj index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Johnson & Johnson Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jnj?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jnj?cursor=` :param page: set the page number of the response :type page: int @@ -162386,7 +162386,7 @@ def index_juniper_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_juniper_get_serialize( + _param = self._index_jnj_get_serialize( page=page, limit=limit, cursor=cursor, @@ -162418,7 +162418,7 @@ def index_juniper_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJuniperPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJNJAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -162429,7 +162429,7 @@ def index_juniper_get_without_preload_content( return response_data.response - def _index_juniper_get_serialize( + def _index_jnj_get_serialize( self, page, limit, @@ -162597,7 +162597,7 @@ def _index_juniper_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/juniper', + resource_path='/v3/index/jnj', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -162614,7 +162614,7 @@ def _index_juniper_get_serialize( @validate_call - def index_jvn_get( + def index_johnson_controls_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -162652,10 +162652,10 @@ def index_jvn_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryJVNPaginatePagination: - """Return vulnerability data stored in index \"jvn\" + ) -> RenderResponseWithMetadataArrayAdvisoryJohnsonControlsPaginatePagination: + """Return vulnerability data stored in index \"johnson-controls\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jvn index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Japan Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jvn?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jvn?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the johnson-controls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Security Advisories - Johnson Controls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/johnson-controls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/johnson-controls?cursor=` :param page: set the page number of the response :type page: int @@ -162727,7 +162727,7 @@ def index_jvn_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jvn_get_serialize( + _param = self._index_johnson_controls_get_serialize( page=page, limit=limit, cursor=cursor, @@ -162759,7 +162759,7 @@ def index_jvn_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJVNPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJohnsonControlsPaginatePagination", '404': "str", '500': "str", } @@ -162775,7 +162775,7 @@ def index_jvn_get( @validate_call - def index_jvn_get_with_http_info( + def index_johnson_controls_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -162813,10 +162813,10 @@ def index_jvn_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJVNPaginatePagination]: - """Return vulnerability data stored in index \"jvn\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJohnsonControlsPaginatePagination]: + """Return vulnerability data stored in index \"johnson-controls\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jvn index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Japan Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jvn?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jvn?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the johnson-controls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Security Advisories - Johnson Controls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/johnson-controls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/johnson-controls?cursor=` :param page: set the page number of the response :type page: int @@ -162888,7 +162888,7 @@ def index_jvn_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jvn_get_serialize( + _param = self._index_johnson_controls_get_serialize( page=page, limit=limit, cursor=cursor, @@ -162920,7 +162920,7 @@ def index_jvn_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJVNPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJohnsonControlsPaginatePagination", '404': "str", '500': "str", } @@ -162936,7 +162936,7 @@ def index_jvn_get_with_http_info( @validate_call - def index_jvn_get_without_preload_content( + def index_johnson_controls_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -162975,9 +162975,9 @@ def index_jvn_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"jvn\" + """Return vulnerability data stored in index \"johnson-controls\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jvn index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Japan Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jvn?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jvn?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the johnson-controls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Security Advisories - Johnson Controls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/johnson-controls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/johnson-controls?cursor=` :param page: set the page number of the response :type page: int @@ -163049,7 +163049,7 @@ def index_jvn_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jvn_get_serialize( + _param = self._index_johnson_controls_get_serialize( page=page, limit=limit, cursor=cursor, @@ -163081,7 +163081,7 @@ def index_jvn_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJVNPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJohnsonControlsPaginatePagination", '404': "str", '500': "str", } @@ -163092,7 +163092,7 @@ def index_jvn_get_without_preload_content( return response_data.response - def _index_jvn_get_serialize( + def _index_johnson_controls_get_serialize( self, page, limit, @@ -163260,7 +163260,7 @@ def _index_jvn_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/jvn', + resource_path='/v3/index/johnson-controls', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -163277,7 +163277,7 @@ def _index_jvn_get_serialize( @validate_call - def index_jvndb_get( + def index_juniper_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -163315,10 +163315,10 @@ def index_jvndb_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryJVNAdvisoryItemPaginatePagination: - """Return vulnerability data stored in index \"jvndb\" + ) -> RenderResponseWithMetadataArrayAdvisoryJuniperPaginatePagination: + """Return vulnerability data stored in index \"juniper\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jvndb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Japan Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jvndb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jvndb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the juniper index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Juniper Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/juniper?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/juniper?cursor=` :param page: set the page number of the response :type page: int @@ -163390,7 +163390,7 @@ def index_jvndb_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jvndb_get_serialize( + _param = self._index_juniper_get_serialize( page=page, limit=limit, cursor=cursor, @@ -163422,7 +163422,7 @@ def index_jvndb_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJVNAdvisoryItemPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJuniperPaginatePagination", '404': "str", '500': "str", } @@ -163438,7 +163438,7 @@ def index_jvndb_get( @validate_call - def index_jvndb_get_with_http_info( + def index_juniper_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -163476,10 +163476,10 @@ def index_jvndb_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJVNAdvisoryItemPaginatePagination]: - """Return vulnerability data stored in index \"jvndb\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJuniperPaginatePagination]: + """Return vulnerability data stored in index \"juniper\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jvndb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Japan Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jvndb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jvndb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the juniper index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Juniper Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/juniper?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/juniper?cursor=` :param page: set the page number of the response :type page: int @@ -163551,7 +163551,7 @@ def index_jvndb_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jvndb_get_serialize( + _param = self._index_juniper_get_serialize( page=page, limit=limit, cursor=cursor, @@ -163583,7 +163583,7 @@ def index_jvndb_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJVNAdvisoryItemPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJuniperPaginatePagination", '404': "str", '500': "str", } @@ -163599,7 +163599,7 @@ def index_jvndb_get_with_http_info( @validate_call - def index_jvndb_get_without_preload_content( + def index_juniper_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -163638,9 +163638,9 @@ def index_jvndb_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"jvndb\" + """Return vulnerability data stored in index \"juniper\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jvndb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Japan Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jvndb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jvndb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the juniper index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Juniper Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/juniper?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/juniper?cursor=` :param page: set the page number of the response :type page: int @@ -163712,7 +163712,7 @@ def index_jvndb_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_jvndb_get_serialize( + _param = self._index_juniper_get_serialize( page=page, limit=limit, cursor=cursor, @@ -163744,7 +163744,7 @@ def index_jvndb_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryJVNAdvisoryItemPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJuniperPaginatePagination", '404': "str", '500': "str", } @@ -163755,7 +163755,7 @@ def index_jvndb_get_without_preload_content( return response_data.response - def _index_jvndb_get_serialize( + def _index_juniper_get_serialize( self, page, limit, @@ -163923,7 +163923,7 @@ def _index_jvndb_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/jvndb', + resource_path='/v3/index/juniper', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -163940,7 +163940,7 @@ def _index_jvndb_get_serialize( @validate_call - def index_kaspersky_ics_cert_get( + def index_jvn_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -163978,10 +163978,10 @@ def index_kaspersky_ics_cert_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryKasperskyICSCERTAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"kaspersky-ics-cert\" + ) -> RenderResponseWithMetadataArrayAdvisoryJVNPaginatePagination: + """Return vulnerability data stored in index \"jvn\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kaspersky-ics-cert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Kaspersky ICS CERT ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kaspersky-ics-cert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kaspersky-ics-cert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jvn index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Japan Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jvn?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jvn?cursor=` :param page: set the page number of the response :type page: int @@ -164053,7 +164053,7 @@ def index_kaspersky_ics_cert_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_kaspersky_ics_cert_get_serialize( + _param = self._index_jvn_get_serialize( page=page, limit=limit, cursor=cursor, @@ -164085,7 +164085,7 @@ def index_kaspersky_ics_cert_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryKasperskyICSCERTAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJVNPaginatePagination", '404': "str", '500': "str", } @@ -164101,7 +164101,7 @@ def index_kaspersky_ics_cert_get( @validate_call - def index_kaspersky_ics_cert_get_with_http_info( + def index_jvn_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -164139,10 +164139,10 @@ def index_kaspersky_ics_cert_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryKasperskyICSCERTAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"kaspersky-ics-cert\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJVNPaginatePagination]: + """Return vulnerability data stored in index \"jvn\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kaspersky-ics-cert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Kaspersky ICS CERT ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kaspersky-ics-cert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kaspersky-ics-cert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jvn index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Japan Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jvn?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jvn?cursor=` :param page: set the page number of the response :type page: int @@ -164214,7 +164214,7 @@ def index_kaspersky_ics_cert_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_kaspersky_ics_cert_get_serialize( + _param = self._index_jvn_get_serialize( page=page, limit=limit, cursor=cursor, @@ -164246,7 +164246,7 @@ def index_kaspersky_ics_cert_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryKasperskyICSCERTAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJVNPaginatePagination", '404': "str", '500': "str", } @@ -164262,7 +164262,7 @@ def index_kaspersky_ics_cert_get_with_http_info( @validate_call - def index_kaspersky_ics_cert_get_without_preload_content( + def index_jvn_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -164301,9 +164301,9 @@ def index_kaspersky_ics_cert_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"kaspersky-ics-cert\" + """Return vulnerability data stored in index \"jvn\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kaspersky-ics-cert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Kaspersky ICS CERT ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kaspersky-ics-cert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kaspersky-ics-cert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jvn index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Japan Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jvn?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jvn?cursor=` :param page: set the page number of the response :type page: int @@ -164375,7 +164375,7 @@ def index_kaspersky_ics_cert_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_kaspersky_ics_cert_get_serialize( + _param = self._index_jvn_get_serialize( page=page, limit=limit, cursor=cursor, @@ -164407,7 +164407,7 @@ def index_kaspersky_ics_cert_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryKasperskyICSCERTAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJVNPaginatePagination", '404': "str", '500': "str", } @@ -164418,7 +164418,7 @@ def index_kaspersky_ics_cert_get_without_preload_content( return response_data.response - def _index_kaspersky_ics_cert_get_serialize( + def _index_jvn_get_serialize( self, page, limit, @@ -164586,7 +164586,7 @@ def _index_kaspersky_ics_cert_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/kaspersky-ics-cert', + resource_path='/v3/index/jvn', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -164603,7 +164603,7 @@ def _index_kaspersky_ics_cert_get_serialize( @validate_call - def index_korelogic_get( + def index_jvndb_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -164641,10 +164641,10 @@ def index_korelogic_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryKoreLogicPaginatePagination: - """Return vulnerability data stored in index \"korelogic\" + ) -> RenderResponseWithMetadataArrayAdvisoryJVNAdvisoryItemPaginatePagination: + """Return vulnerability data stored in index \"jvndb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the korelogic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KoreLogic Vulnerability Research and Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/korelogic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/korelogic?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jvndb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Japan Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jvndb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jvndb?cursor=` :param page: set the page number of the response :type page: int @@ -164716,7 +164716,7 @@ def index_korelogic_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_korelogic_get_serialize( + _param = self._index_jvndb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -164748,7 +164748,7 @@ def index_korelogic_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryKoreLogicPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJVNAdvisoryItemPaginatePagination", '404': "str", '500': "str", } @@ -164764,7 +164764,7 @@ def index_korelogic_get( @validate_call - def index_korelogic_get_with_http_info( + def index_jvndb_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -164802,10 +164802,10 @@ def index_korelogic_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryKoreLogicPaginatePagination]: - """Return vulnerability data stored in index \"korelogic\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryJVNAdvisoryItemPaginatePagination]: + """Return vulnerability data stored in index \"jvndb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the korelogic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KoreLogic Vulnerability Research and Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/korelogic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/korelogic?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jvndb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Japan Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jvndb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jvndb?cursor=` :param page: set the page number of the response :type page: int @@ -164877,7 +164877,7 @@ def index_korelogic_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_korelogic_get_serialize( + _param = self._index_jvndb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -164909,7 +164909,7 @@ def index_korelogic_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryKoreLogicPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJVNAdvisoryItemPaginatePagination", '404': "str", '500': "str", } @@ -164925,7 +164925,7 @@ def index_korelogic_get_with_http_info( @validate_call - def index_korelogic_get_without_preload_content( + def index_jvndb_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -164964,9 +164964,9 @@ def index_korelogic_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"korelogic\" + """Return vulnerability data stored in index \"jvndb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the korelogic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KoreLogic Vulnerability Research and Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/korelogic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/korelogic?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the jvndb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Japan Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/jvndb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/jvndb?cursor=` :param page: set the page number of the response :type page: int @@ -165038,7 +165038,7 @@ def index_korelogic_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_korelogic_get_serialize( + _param = self._index_jvndb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -165070,7 +165070,7 @@ def index_korelogic_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryKoreLogicPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryJVNAdvisoryItemPaginatePagination", '404': "str", '500': "str", } @@ -165081,7 +165081,7 @@ def index_korelogic_get_without_preload_content( return response_data.response - def _index_korelogic_get_serialize( + def _index_jvndb_get_serialize( self, page, limit, @@ -165249,7 +165249,7 @@ def _index_korelogic_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/korelogic', + resource_path='/v3/index/jvndb', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -165266,7 +165266,7 @@ def _index_korelogic_get_serialize( @validate_call - def index_krcert_security_notices_get( + def index_kaspersky_ics_cert_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -165304,10 +165304,10 @@ def index_krcert_security_notices_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"krcert-security-notices\" + ) -> RenderResponseWithMetadataArrayAdvisoryKasperskyICSCERTAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"kaspersky-ics-cert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the krcert-security-notices index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KR-CERT Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-security-notices?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/krcert-security-notices?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kaspersky-ics-cert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Kaspersky ICS CERT ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kaspersky-ics-cert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kaspersky-ics-cert?cursor=` :param page: set the page number of the response :type page: int @@ -165379,7 +165379,7 @@ def index_krcert_security_notices_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_krcert_security_notices_get_serialize( + _param = self._index_kaspersky_ics_cert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -165411,7 +165411,7 @@ def index_krcert_security_notices_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryKasperskyICSCERTAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -165427,7 +165427,7 @@ def index_krcert_security_notices_get( @validate_call - def index_krcert_security_notices_get_with_http_info( + def index_kaspersky_ics_cert_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -165465,10 +165465,10 @@ def index_krcert_security_notices_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"krcert-security-notices\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryKasperskyICSCERTAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"kaspersky-ics-cert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the krcert-security-notices index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KR-CERT Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-security-notices?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/krcert-security-notices?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kaspersky-ics-cert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Kaspersky ICS CERT ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kaspersky-ics-cert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kaspersky-ics-cert?cursor=` :param page: set the page number of the response :type page: int @@ -165540,7 +165540,7 @@ def index_krcert_security_notices_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_krcert_security_notices_get_serialize( + _param = self._index_kaspersky_ics_cert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -165572,7 +165572,7 @@ def index_krcert_security_notices_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryKasperskyICSCERTAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -165588,7 +165588,7 @@ def index_krcert_security_notices_get_with_http_info( @validate_call - def index_krcert_security_notices_get_without_preload_content( + def index_kaspersky_ics_cert_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -165627,9 +165627,9 @@ def index_krcert_security_notices_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"krcert-security-notices\" + """Return vulnerability data stored in index \"kaspersky-ics-cert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the krcert-security-notices index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KR-CERT Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-security-notices?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/krcert-security-notices?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kaspersky-ics-cert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Kaspersky ICS CERT ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kaspersky-ics-cert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kaspersky-ics-cert?cursor=` :param page: set the page number of the response :type page: int @@ -165701,7 +165701,7 @@ def index_krcert_security_notices_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_krcert_security_notices_get_serialize( + _param = self._index_kaspersky_ics_cert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -165733,7 +165733,7 @@ def index_krcert_security_notices_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryKasperskyICSCERTAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -165744,7 +165744,7 @@ def index_krcert_security_notices_get_without_preload_content( return response_data.response - def _index_krcert_security_notices_get_serialize( + def _index_kaspersky_ics_cert_get_serialize( self, page, limit, @@ -165912,7 +165912,7 @@ def _index_krcert_security_notices_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/krcert-security-notices', + resource_path='/v3/index/kaspersky-ics-cert', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -165929,7 +165929,7 @@ def _index_krcert_security_notices_get_serialize( @validate_call - def index_krcert_vulnerabilities_get( + def index_korelogic_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -165967,10 +165967,10 @@ def index_krcert_vulnerabilities_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"krcert-vulnerabilities\" + ) -> RenderResponseWithMetadataArrayAdvisoryKoreLogicPaginatePagination: + """Return vulnerability data stored in index \"korelogic\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the krcert-vulnerabilities index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KR-CERT Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-vulnerabilities?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/krcert-vulnerabilities?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the korelogic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KoreLogic Vulnerability Research and Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/korelogic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/korelogic?cursor=` :param page: set the page number of the response :type page: int @@ -166042,7 +166042,7 @@ def index_krcert_vulnerabilities_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_krcert_vulnerabilities_get_serialize( + _param = self._index_korelogic_get_serialize( page=page, limit=limit, cursor=cursor, @@ -166074,7 +166074,7 @@ def index_krcert_vulnerabilities_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryKoreLogicPaginatePagination", '404': "str", '500': "str", } @@ -166090,7 +166090,7 @@ def index_krcert_vulnerabilities_get( @validate_call - def index_krcert_vulnerabilities_get_with_http_info( + def index_korelogic_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -166128,10 +166128,10 @@ def index_krcert_vulnerabilities_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"krcert-vulnerabilities\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryKoreLogicPaginatePagination]: + """Return vulnerability data stored in index \"korelogic\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the krcert-vulnerabilities index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KR-CERT Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-vulnerabilities?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/krcert-vulnerabilities?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the korelogic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KoreLogic Vulnerability Research and Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/korelogic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/korelogic?cursor=` :param page: set the page number of the response :type page: int @@ -166203,7 +166203,7 @@ def index_krcert_vulnerabilities_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_krcert_vulnerabilities_get_serialize( + _param = self._index_korelogic_get_serialize( page=page, limit=limit, cursor=cursor, @@ -166235,7 +166235,7 @@ def index_krcert_vulnerabilities_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryKoreLogicPaginatePagination", '404': "str", '500': "str", } @@ -166251,7 +166251,7 @@ def index_krcert_vulnerabilities_get_with_http_info( @validate_call - def index_krcert_vulnerabilities_get_without_preload_content( + def index_korelogic_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -166290,9 +166290,9 @@ def index_krcert_vulnerabilities_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"krcert-vulnerabilities\" + """Return vulnerability data stored in index \"korelogic\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the krcert-vulnerabilities index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KR-CERT Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-vulnerabilities?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/krcert-vulnerabilities?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the korelogic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KoreLogic Vulnerability Research and Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/korelogic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/korelogic?cursor=` :param page: set the page number of the response :type page: int @@ -166364,7 +166364,7 @@ def index_krcert_vulnerabilities_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_krcert_vulnerabilities_get_serialize( + _param = self._index_korelogic_get_serialize( page=page, limit=limit, cursor=cursor, @@ -166396,7 +166396,7 @@ def index_krcert_vulnerabilities_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryKoreLogicPaginatePagination", '404': "str", '500': "str", } @@ -166407,7 +166407,7 @@ def index_krcert_vulnerabilities_get_without_preload_content( return response_data.response - def _index_krcert_vulnerabilities_get_serialize( + def _index_korelogic_get_serialize( self, page, limit, @@ -166575,7 +166575,7 @@ def _index_krcert_vulnerabilities_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/krcert-vulnerabilities', + resource_path='/v3/index/korelogic', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -166592,7 +166592,7 @@ def _index_krcert_vulnerabilities_get_serialize( @validate_call - def index_kubernetes_get( + def index_krcert_security_notices_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -166630,10 +166630,10 @@ def index_kubernetes_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryK8SPaginatePagination: - """Return vulnerability data stored in index \"kubernetes\" + ) -> RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"krcert-security-notices\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kubernetes index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Kubernetes Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kubernetes?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kubernetes?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the krcert-security-notices index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KR-CERT Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-security-notices?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/krcert-security-notices?cursor=` :param page: set the page number of the response :type page: int @@ -166705,7 +166705,7 @@ def index_kubernetes_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_kubernetes_get_serialize( + _param = self._index_krcert_security_notices_get_serialize( page=page, limit=limit, cursor=cursor, @@ -166737,7 +166737,7 @@ def index_kubernetes_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryK8SPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -166753,7 +166753,7 @@ def index_kubernetes_get( @validate_call - def index_kubernetes_get_with_http_info( + def index_krcert_security_notices_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -166791,10 +166791,10 @@ def index_kubernetes_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryK8SPaginatePagination]: - """Return vulnerability data stored in index \"kubernetes\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"krcert-security-notices\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kubernetes index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Kubernetes Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kubernetes?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kubernetes?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the krcert-security-notices index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KR-CERT Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-security-notices?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/krcert-security-notices?cursor=` :param page: set the page number of the response :type page: int @@ -166866,7 +166866,7 @@ def index_kubernetes_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_kubernetes_get_serialize( + _param = self._index_krcert_security_notices_get_serialize( page=page, limit=limit, cursor=cursor, @@ -166898,7 +166898,7 @@ def index_kubernetes_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryK8SPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -166914,7 +166914,7 @@ def index_kubernetes_get_with_http_info( @validate_call - def index_kubernetes_get_without_preload_content( + def index_krcert_security_notices_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -166953,9 +166953,9 @@ def index_kubernetes_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"kubernetes\" + """Return vulnerability data stored in index \"krcert-security-notices\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kubernetes index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Kubernetes Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kubernetes?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kubernetes?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the krcert-security-notices index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KR-CERT Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-security-notices?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/krcert-security-notices?cursor=` :param page: set the page number of the response :type page: int @@ -167027,7 +167027,7 @@ def index_kubernetes_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_kubernetes_get_serialize( + _param = self._index_krcert_security_notices_get_serialize( page=page, limit=limit, cursor=cursor, @@ -167059,7 +167059,7 @@ def index_kubernetes_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryK8SPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -167070,7 +167070,7 @@ def index_kubernetes_get_without_preload_content( return response_data.response - def _index_kubernetes_get_serialize( + def _index_krcert_security_notices_get_serialize( self, page, limit, @@ -167238,7 +167238,7 @@ def _index_kubernetes_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/kubernetes', + resource_path='/v3/index/krcert-security-notices', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -167255,7 +167255,7 @@ def _index_kubernetes_get_serialize( @validate_call - def index_kunbus_get( + def index_krcert_vulnerabilities_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -167293,10 +167293,10 @@ def index_kunbus_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryKunbusPaginatePagination: - """Return vulnerability data stored in index \"kunbus\" + ) -> RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"krcert-vulnerabilities\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kunbus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KunBus Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kunbus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kunbus?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the krcert-vulnerabilities index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KR-CERT Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-vulnerabilities?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/krcert-vulnerabilities?cursor=` :param page: set the page number of the response :type page: int @@ -167368,7 +167368,7 @@ def index_kunbus_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_kunbus_get_serialize( + _param = self._index_krcert_vulnerabilities_get_serialize( page=page, limit=limit, cursor=cursor, @@ -167400,7 +167400,7 @@ def index_kunbus_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryKunbusPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -167416,7 +167416,7 @@ def index_kunbus_get( @validate_call - def index_kunbus_get_with_http_info( + def index_krcert_vulnerabilities_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -167454,10 +167454,10 @@ def index_kunbus_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryKunbusPaginatePagination]: - """Return vulnerability data stored in index \"kunbus\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"krcert-vulnerabilities\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kunbus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KunBus Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kunbus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kunbus?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the krcert-vulnerabilities index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KR-CERT Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-vulnerabilities?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/krcert-vulnerabilities?cursor=` :param page: set the page number of the response :type page: int @@ -167529,7 +167529,7 @@ def index_kunbus_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_kunbus_get_serialize( + _param = self._index_krcert_vulnerabilities_get_serialize( page=page, limit=limit, cursor=cursor, @@ -167561,7 +167561,7 @@ def index_kunbus_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryKunbusPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -167577,7 +167577,7 @@ def index_kunbus_get_with_http_info( @validate_call - def index_kunbus_get_without_preload_content( + def index_krcert_vulnerabilities_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -167616,9 +167616,9 @@ def index_kunbus_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"kunbus\" + """Return vulnerability data stored in index \"krcert-vulnerabilities\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kunbus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KunBus Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kunbus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kunbus?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the krcert-vulnerabilities index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KR-CERT Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-vulnerabilities?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/krcert-vulnerabilities?cursor=` :param page: set the page number of the response :type page: int @@ -167690,7 +167690,7 @@ def index_kunbus_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_kunbus_get_serialize( + _param = self._index_krcert_vulnerabilities_get_serialize( page=page, limit=limit, cursor=cursor, @@ -167722,7 +167722,7 @@ def index_kunbus_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryKunbusPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -167733,7 +167733,7 @@ def index_kunbus_get_without_preload_content( return response_data.response - def _index_kunbus_get_serialize( + def _index_krcert_vulnerabilities_get_serialize( self, page, limit, @@ -167901,7 +167901,7 @@ def _index_kunbus_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/kunbus', + resource_path='/v3/index/krcert-vulnerabilities', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -167918,7 +167918,7 @@ def _index_kunbus_get_serialize( @validate_call - def index_lantronix_get( + def index_kubernetes_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -167956,10 +167956,10 @@ def index_lantronix_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryLantronixPaginatePagination: - """Return vulnerability data stored in index \"lantronix\" + ) -> RenderResponseWithMetadataArrayAdvisoryK8SPaginatePagination: + """Return vulnerability data stored in index \"kubernetes\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lantronix index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lantronix Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lantronix?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lantronix?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kubernetes index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Kubernetes Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kubernetes?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kubernetes?cursor=` :param page: set the page number of the response :type page: int @@ -168031,7 +168031,7 @@ def index_lantronix_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_lantronix_get_serialize( + _param = self._index_kubernetes_get_serialize( page=page, limit=limit, cursor=cursor, @@ -168063,7 +168063,7 @@ def index_lantronix_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLantronixPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryK8SPaginatePagination", '404': "str", '500': "str", } @@ -168079,7 +168079,7 @@ def index_lantronix_get( @validate_call - def index_lantronix_get_with_http_info( + def index_kubernetes_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -168117,10 +168117,10 @@ def index_lantronix_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLantronixPaginatePagination]: - """Return vulnerability data stored in index \"lantronix\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryK8SPaginatePagination]: + """Return vulnerability data stored in index \"kubernetes\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lantronix index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lantronix Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lantronix?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lantronix?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kubernetes index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Kubernetes Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kubernetes?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kubernetes?cursor=` :param page: set the page number of the response :type page: int @@ -168192,7 +168192,7 @@ def index_lantronix_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_lantronix_get_serialize( + _param = self._index_kubernetes_get_serialize( page=page, limit=limit, cursor=cursor, @@ -168224,7 +168224,7 @@ def index_lantronix_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLantronixPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryK8SPaginatePagination", '404': "str", '500': "str", } @@ -168240,7 +168240,7 @@ def index_lantronix_get_with_http_info( @validate_call - def index_lantronix_get_without_preload_content( + def index_kubernetes_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -168279,9 +168279,9 @@ def index_lantronix_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"lantronix\" + """Return vulnerability data stored in index \"kubernetes\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lantronix index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lantronix Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lantronix?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lantronix?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kubernetes index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Kubernetes Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kubernetes?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kubernetes?cursor=` :param page: set the page number of the response :type page: int @@ -168353,7 +168353,7 @@ def index_lantronix_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_lantronix_get_serialize( + _param = self._index_kubernetes_get_serialize( page=page, limit=limit, cursor=cursor, @@ -168385,7 +168385,7 @@ def index_lantronix_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLantronixPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryK8SPaginatePagination", '404': "str", '500': "str", } @@ -168396,7 +168396,7 @@ def index_lantronix_get_without_preload_content( return response_data.response - def _index_lantronix_get_serialize( + def _index_kubernetes_get_serialize( self, page, limit, @@ -168564,7 +168564,7 @@ def _index_lantronix_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/lantronix', + resource_path='/v3/index/kubernetes', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -168581,7 +168581,7 @@ def _index_lantronix_get_serialize( @validate_call - def index_lenovo_get( + def index_kunbus_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -168619,10 +168619,10 @@ def index_lenovo_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryLenovoPaginatePagination: - """Return vulnerability data stored in index \"lenovo\" + ) -> RenderResponseWithMetadataArrayAdvisoryKunbusPaginatePagination: + """Return vulnerability data stored in index \"kunbus\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lenovo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lenovo Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lenovo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lenovo?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kunbus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KunBus Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kunbus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kunbus?cursor=` :param page: set the page number of the response :type page: int @@ -168694,7 +168694,7 @@ def index_lenovo_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_lenovo_get_serialize( + _param = self._index_kunbus_get_serialize( page=page, limit=limit, cursor=cursor, @@ -168726,7 +168726,7 @@ def index_lenovo_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLenovoPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryKunbusPaginatePagination", '404': "str", '500': "str", } @@ -168742,7 +168742,7 @@ def index_lenovo_get( @validate_call - def index_lenovo_get_with_http_info( + def index_kunbus_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -168780,10 +168780,10 @@ def index_lenovo_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLenovoPaginatePagination]: - """Return vulnerability data stored in index \"lenovo\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryKunbusPaginatePagination]: + """Return vulnerability data stored in index \"kunbus\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lenovo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lenovo Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lenovo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lenovo?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kunbus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KunBus Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kunbus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kunbus?cursor=` :param page: set the page number of the response :type page: int @@ -168855,7 +168855,7 @@ def index_lenovo_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_lenovo_get_serialize( + _param = self._index_kunbus_get_serialize( page=page, limit=limit, cursor=cursor, @@ -168887,7 +168887,7 @@ def index_lenovo_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLenovoPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryKunbusPaginatePagination", '404': "str", '500': "str", } @@ -168903,7 +168903,7 @@ def index_lenovo_get_with_http_info( @validate_call - def index_lenovo_get_without_preload_content( + def index_kunbus_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -168942,9 +168942,9 @@ def index_lenovo_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"lenovo\" + """Return vulnerability data stored in index \"kunbus\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lenovo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lenovo Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lenovo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lenovo?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the kunbus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** KunBus Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/kunbus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/kunbus?cursor=` :param page: set the page number of the response :type page: int @@ -169016,7 +169016,7 @@ def index_lenovo_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_lenovo_get_serialize( + _param = self._index_kunbus_get_serialize( page=page, limit=limit, cursor=cursor, @@ -169048,7 +169048,7 @@ def index_lenovo_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLenovoPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryKunbusPaginatePagination", '404': "str", '500': "str", } @@ -169059,7 +169059,7 @@ def index_lenovo_get_without_preload_content( return response_data.response - def _index_lenovo_get_serialize( + def _index_kunbus_get_serialize( self, page, limit, @@ -169227,7 +169227,7 @@ def _index_lenovo_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/lenovo', + resource_path='/v3/index/kunbus', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -169244,7 +169244,7 @@ def _index_lenovo_get_serialize( @validate_call - def index_lexmark_get( + def index_lantronix_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -169282,10 +169282,10 @@ def index_lexmark_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryLexmarkAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"lexmark\" + ) -> RenderResponseWithMetadataArrayAdvisoryLantronixPaginatePagination: + """Return vulnerability data stored in index \"lantronix\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lexmark index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lexmark Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lexmark?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lexmark?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lantronix index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lantronix Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lantronix?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lantronix?cursor=` :param page: set the page number of the response :type page: int @@ -169357,7 +169357,7 @@ def index_lexmark_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_lexmark_get_serialize( + _param = self._index_lantronix_get_serialize( page=page, limit=limit, cursor=cursor, @@ -169389,7 +169389,7 @@ def index_lexmark_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLexmarkAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLantronixPaginatePagination", '404': "str", '500': "str", } @@ -169405,7 +169405,7 @@ def index_lexmark_get( @validate_call - def index_lexmark_get_with_http_info( + def index_lantronix_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -169443,10 +169443,10 @@ def index_lexmark_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLexmarkAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"lexmark\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLantronixPaginatePagination]: + """Return vulnerability data stored in index \"lantronix\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lexmark index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lexmark Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lexmark?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lexmark?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lantronix index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lantronix Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lantronix?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lantronix?cursor=` :param page: set the page number of the response :type page: int @@ -169518,7 +169518,7 @@ def index_lexmark_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_lexmark_get_serialize( + _param = self._index_lantronix_get_serialize( page=page, limit=limit, cursor=cursor, @@ -169550,7 +169550,7 @@ def index_lexmark_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLexmarkAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLantronixPaginatePagination", '404': "str", '500': "str", } @@ -169566,7 +169566,7 @@ def index_lexmark_get_with_http_info( @validate_call - def index_lexmark_get_without_preload_content( + def index_lantronix_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -169605,9 +169605,9 @@ def index_lexmark_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"lexmark\" + """Return vulnerability data stored in index \"lantronix\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lexmark index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lexmark Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lexmark?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lexmark?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lantronix index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lantronix Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lantronix?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lantronix?cursor=` :param page: set the page number of the response :type page: int @@ -169679,7 +169679,7 @@ def index_lexmark_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_lexmark_get_serialize( + _param = self._index_lantronix_get_serialize( page=page, limit=limit, cursor=cursor, @@ -169711,7 +169711,7 @@ def index_lexmark_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLexmarkAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLantronixPaginatePagination", '404': "str", '500': "str", } @@ -169722,7 +169722,7 @@ def index_lexmark_get_without_preload_content( return response_data.response - def _index_lexmark_get_serialize( + def _index_lantronix_get_serialize( self, page, limit, @@ -169890,7 +169890,7 @@ def _index_lexmark_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/lexmark', + resource_path='/v3/index/lantronix', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -169907,7 +169907,7 @@ def _index_lexmark_get_serialize( @validate_call - def index_lg_get( + def index_lenovo_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -169945,10 +169945,10 @@ def index_lg_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryLGPaginatePagination: - """Return vulnerability data stored in index \"lg\" + ) -> RenderResponseWithMetadataArrayAdvisoryLenovoPaginatePagination: + """Return vulnerability data stored in index \"lenovo\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lg index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** LG Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lg?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lg?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lenovo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lenovo Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lenovo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lenovo?cursor=` :param page: set the page number of the response :type page: int @@ -170020,7 +170020,7 @@ def index_lg_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_lg_get_serialize( + _param = self._index_lenovo_get_serialize( page=page, limit=limit, cursor=cursor, @@ -170052,7 +170052,7 @@ def index_lg_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLGPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLenovoPaginatePagination", '404': "str", '500': "str", } @@ -170068,7 +170068,7 @@ def index_lg_get( @validate_call - def index_lg_get_with_http_info( + def index_lenovo_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -170106,10 +170106,10 @@ def index_lg_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLGPaginatePagination]: - """Return vulnerability data stored in index \"lg\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLenovoPaginatePagination]: + """Return vulnerability data stored in index \"lenovo\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lg index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** LG Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lg?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lg?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lenovo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lenovo Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lenovo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lenovo?cursor=` :param page: set the page number of the response :type page: int @@ -170181,7 +170181,7 @@ def index_lg_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_lg_get_serialize( + _param = self._index_lenovo_get_serialize( page=page, limit=limit, cursor=cursor, @@ -170213,7 +170213,7 @@ def index_lg_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLGPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLenovoPaginatePagination", '404': "str", '500': "str", } @@ -170229,7 +170229,7 @@ def index_lg_get_with_http_info( @validate_call - def index_lg_get_without_preload_content( + def index_lenovo_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -170268,9 +170268,9 @@ def index_lg_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"lg\" + """Return vulnerability data stored in index \"lenovo\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lg index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** LG Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lg?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lg?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lenovo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lenovo Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lenovo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lenovo?cursor=` :param page: set the page number of the response :type page: int @@ -170342,7 +170342,7 @@ def index_lg_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_lg_get_serialize( + _param = self._index_lenovo_get_serialize( page=page, limit=limit, cursor=cursor, @@ -170374,7 +170374,7 @@ def index_lg_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLGPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLenovoPaginatePagination", '404': "str", '500': "str", } @@ -170385,7 +170385,7 @@ def index_lg_get_without_preload_content( return response_data.response - def _index_lg_get_serialize( + def _index_lenovo_get_serialize( self, page, limit, @@ -170553,7 +170553,7 @@ def _index_lg_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/lg', + resource_path='/v3/index/lenovo', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -170570,7 +170570,7 @@ def _index_lg_get_serialize( @validate_call - def index_libre_office_get( + def index_lexmark_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -170608,10 +170608,10 @@ def index_libre_office_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryLibreOfficePaginatePagination: - """Return vulnerability data stored in index \"libre-office\" + ) -> RenderResponseWithMetadataArrayAdvisoryLexmarkAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"lexmark\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the libre-office index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Libre Office Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/libre-office?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/libre-office?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lexmark index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lexmark Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lexmark?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lexmark?cursor=` :param page: set the page number of the response :type page: int @@ -170683,7 +170683,7 @@ def index_libre_office_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_libre_office_get_serialize( + _param = self._index_lexmark_get_serialize( page=page, limit=limit, cursor=cursor, @@ -170715,7 +170715,7 @@ def index_libre_office_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLibreOfficePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLexmarkAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -170731,7 +170731,7 @@ def index_libre_office_get( @validate_call - def index_libre_office_get_with_http_info( + def index_lexmark_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -170769,10 +170769,10 @@ def index_libre_office_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLibreOfficePaginatePagination]: - """Return vulnerability data stored in index \"libre-office\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLexmarkAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"lexmark\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the libre-office index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Libre Office Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/libre-office?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/libre-office?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lexmark index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lexmark Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lexmark?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lexmark?cursor=` :param page: set the page number of the response :type page: int @@ -170844,7 +170844,7 @@ def index_libre_office_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_libre_office_get_serialize( + _param = self._index_lexmark_get_serialize( page=page, limit=limit, cursor=cursor, @@ -170876,7 +170876,7 @@ def index_libre_office_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLibreOfficePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLexmarkAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -170892,7 +170892,7 @@ def index_libre_office_get_with_http_info( @validate_call - def index_libre_office_get_without_preload_content( + def index_lexmark_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -170931,9 +170931,9 @@ def index_libre_office_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"libre-office\" + """Return vulnerability data stored in index \"lexmark\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the libre-office index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Libre Office Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/libre-office?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/libre-office?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lexmark index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Lexmark Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lexmark?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lexmark?cursor=` :param page: set the page number of the response :type page: int @@ -171005,7 +171005,7 @@ def index_libre_office_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_libre_office_get_serialize( + _param = self._index_lexmark_get_serialize( page=page, limit=limit, cursor=cursor, @@ -171037,7 +171037,7 @@ def index_libre_office_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLibreOfficePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLexmarkAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -171048,7 +171048,7 @@ def index_libre_office_get_without_preload_content( return response_data.response - def _index_libre_office_get_serialize( + def _index_lexmark_get_serialize( self, page, limit, @@ -171216,7 +171216,7 @@ def _index_libre_office_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/libre-office', + resource_path='/v3/index/lexmark', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -171233,7 +171233,7 @@ def _index_libre_office_get_serialize( @validate_call - def index_linux_get( + def index_lg_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -171271,10 +171271,10 @@ def index_linux_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryLinuxPaginatePagination: - """Return vulnerability data stored in index \"linux\" + ) -> RenderResponseWithMetadataArrayAdvisoryLGPaginatePagination: + """Return vulnerability data stored in index \"lg\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the linux index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Linux Kernel Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/linux?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/linux?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lg index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** LG Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lg?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lg?cursor=` :param page: set the page number of the response :type page: int @@ -171346,7 +171346,7 @@ def index_linux_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_linux_get_serialize( + _param = self._index_lg_get_serialize( page=page, limit=limit, cursor=cursor, @@ -171378,7 +171378,7 @@ def index_linux_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLinuxPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLGPaginatePagination", '404': "str", '500': "str", } @@ -171394,7 +171394,7 @@ def index_linux_get( @validate_call - def index_linux_get_with_http_info( + def index_lg_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -171432,10 +171432,10 @@ def index_linux_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLinuxPaginatePagination]: - """Return vulnerability data stored in index \"linux\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLGPaginatePagination]: + """Return vulnerability data stored in index \"lg\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the linux index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Linux Kernel Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/linux?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/linux?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lg index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** LG Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lg?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lg?cursor=` :param page: set the page number of the response :type page: int @@ -171507,7 +171507,7 @@ def index_linux_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_linux_get_serialize( + _param = self._index_lg_get_serialize( page=page, limit=limit, cursor=cursor, @@ -171539,7 +171539,7 @@ def index_linux_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLinuxPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLGPaginatePagination", '404': "str", '500': "str", } @@ -171555,7 +171555,7 @@ def index_linux_get_with_http_info( @validate_call - def index_linux_get_without_preload_content( + def index_lg_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -171594,9 +171594,9 @@ def index_linux_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"linux\" + """Return vulnerability data stored in index \"lg\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the linux index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Linux Kernel Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/linux?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/linux?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lg index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** LG Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lg?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lg?cursor=` :param page: set the page number of the response :type page: int @@ -171668,7 +171668,7 @@ def index_linux_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_linux_get_serialize( + _param = self._index_lg_get_serialize( page=page, limit=limit, cursor=cursor, @@ -171700,7 +171700,7 @@ def index_linux_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLinuxPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLGPaginatePagination", '404': "str", '500': "str", } @@ -171711,7 +171711,7 @@ def index_linux_get_without_preload_content( return response_data.response - def _index_linux_get_serialize( + def _index_lg_get_serialize( self, page, limit, @@ -171879,7 +171879,7 @@ def _index_linux_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/linux', + resource_path='/v3/index/lg', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -171896,7 +171896,7 @@ def _index_linux_get_serialize( @validate_call - def index_lol_advs_get( + def index_libre_office_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -171934,10 +171934,10 @@ def index_lol_advs_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryLolAdvsPaginatePagination: - """Return vulnerability data stored in index \"lol-advs\" + ) -> RenderResponseWithMetadataArrayAdvisoryLibreOfficePaginatePagination: + """Return vulnerability data stored in index \"libre-office\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lol-advs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Living Off the Land Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lol-advs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lol-advs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the libre-office index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Libre Office Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/libre-office?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/libre-office?cursor=` :param page: set the page number of the response :type page: int @@ -172009,7 +172009,7 @@ def index_lol_advs_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_lol_advs_get_serialize( + _param = self._index_libre_office_get_serialize( page=page, limit=limit, cursor=cursor, @@ -172041,7 +172041,7 @@ def index_lol_advs_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLolAdvsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLibreOfficePaginatePagination", '404': "str", '500': "str", } @@ -172057,7 +172057,7 @@ def index_lol_advs_get( @validate_call - def index_lol_advs_get_with_http_info( + def index_libre_office_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -172095,10 +172095,10 @@ def index_lol_advs_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLolAdvsPaginatePagination]: - """Return vulnerability data stored in index \"lol-advs\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLibreOfficePaginatePagination]: + """Return vulnerability data stored in index \"libre-office\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lol-advs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Living Off the Land Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lol-advs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lol-advs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the libre-office index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Libre Office Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/libre-office?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/libre-office?cursor=` :param page: set the page number of the response :type page: int @@ -172170,7 +172170,7 @@ def index_lol_advs_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_lol_advs_get_serialize( + _param = self._index_libre_office_get_serialize( page=page, limit=limit, cursor=cursor, @@ -172202,7 +172202,7 @@ def index_lol_advs_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLolAdvsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLibreOfficePaginatePagination", '404': "str", '500': "str", } @@ -172218,7 +172218,7 @@ def index_lol_advs_get_with_http_info( @validate_call - def index_lol_advs_get_without_preload_content( + def index_libre_office_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -172257,9 +172257,9 @@ def index_lol_advs_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"lol-advs\" + """Return vulnerability data stored in index \"libre-office\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lol-advs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Living Off the Land Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lol-advs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lol-advs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the libre-office index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Libre Office Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/libre-office?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/libre-office?cursor=` :param page: set the page number of the response :type page: int @@ -172331,7 +172331,7 @@ def index_lol_advs_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_lol_advs_get_serialize( + _param = self._index_libre_office_get_serialize( page=page, limit=limit, cursor=cursor, @@ -172363,7 +172363,7 @@ def index_lol_advs_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryLolAdvsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLibreOfficePaginatePagination", '404': "str", '500': "str", } @@ -172374,7 +172374,7 @@ def index_lol_advs_get_without_preload_content( return response_data.response - def _index_lol_advs_get_serialize( + def _index_libre_office_get_serialize( self, page, limit, @@ -172542,7 +172542,7 @@ def _index_lol_advs_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/lol-advs', + resource_path='/v3/index/libre-office', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -172559,7 +172559,7 @@ def _index_lol_advs_get_serialize( @validate_call - def index_m_files_get( + def index_linux_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -172597,10 +172597,10 @@ def index_m_files_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMFilesPaginatePagination: - """Return vulnerability data stored in index \"m-files\" + ) -> RenderResponseWithMetadataArrayAdvisoryLinuxPaginatePagination: + """Return vulnerability data stored in index \"linux\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the m-files index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** M-Files Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/m-files?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/m-files?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the linux index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Linux Kernel Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/linux?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/linux?cursor=` :param page: set the page number of the response :type page: int @@ -172672,7 +172672,7 @@ def index_m_files_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_m_files_get_serialize( + _param = self._index_linux_get_serialize( page=page, limit=limit, cursor=cursor, @@ -172704,7 +172704,7 @@ def index_m_files_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMFilesPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLinuxPaginatePagination", '404': "str", '500': "str", } @@ -172720,7 +172720,7 @@ def index_m_files_get( @validate_call - def index_m_files_get_with_http_info( + def index_linux_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -172758,10 +172758,10 @@ def index_m_files_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMFilesPaginatePagination]: - """Return vulnerability data stored in index \"m-files\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLinuxPaginatePagination]: + """Return vulnerability data stored in index \"linux\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the m-files index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** M-Files Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/m-files?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/m-files?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the linux index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Linux Kernel Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/linux?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/linux?cursor=` :param page: set the page number of the response :type page: int @@ -172833,7 +172833,7 @@ def index_m_files_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_m_files_get_serialize( + _param = self._index_linux_get_serialize( page=page, limit=limit, cursor=cursor, @@ -172865,7 +172865,7 @@ def index_m_files_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMFilesPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLinuxPaginatePagination", '404': "str", '500': "str", } @@ -172881,7 +172881,7 @@ def index_m_files_get_with_http_info( @validate_call - def index_m_files_get_without_preload_content( + def index_linux_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -172920,9 +172920,9 @@ def index_m_files_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"m-files\" + """Return vulnerability data stored in index \"linux\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the m-files index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** M-Files Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/m-files?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/m-files?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the linux index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Linux Kernel Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/linux?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/linux?cursor=` :param page: set the page number of the response :type page: int @@ -172994,7 +172994,7 @@ def index_m_files_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_m_files_get_serialize( + _param = self._index_linux_get_serialize( page=page, limit=limit, cursor=cursor, @@ -173026,7 +173026,7 @@ def index_m_files_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMFilesPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLinuxPaginatePagination", '404': "str", '500': "str", } @@ -173037,7 +173037,7 @@ def index_m_files_get_without_preload_content( return response_data.response - def _index_m_files_get_serialize( + def _index_linux_get_serialize( self, page, limit, @@ -173205,7 +173205,7 @@ def _index_m_files_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/m-files', + resource_path='/v3/index/linux', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -173222,7 +173222,7 @@ def _index_m_files_get_serialize( @validate_call - def index_macert_get( + def index_lol_advs_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -173260,10 +173260,10 @@ def index_macert_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMACertPaginatePagination: - """Return vulnerability data stored in index \"macert\" + ) -> RenderResponseWithMetadataArrayAdvisoryLolAdvsPaginatePagination: + """Return vulnerability data stored in index \"lol-advs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the macert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Moroccan CERT Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/macert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/macert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lol-advs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Living Off the Land Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lol-advs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lol-advs?cursor=` :param page: set the page number of the response :type page: int @@ -173335,7 +173335,7 @@ def index_macert_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_macert_get_serialize( + _param = self._index_lol_advs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -173367,7 +173367,7 @@ def index_macert_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMACertPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLolAdvsPaginatePagination", '404': "str", '500': "str", } @@ -173383,7 +173383,7 @@ def index_macert_get( @validate_call - def index_macert_get_with_http_info( + def index_lol_advs_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -173421,10 +173421,10 @@ def index_macert_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMACertPaginatePagination]: - """Return vulnerability data stored in index \"macert\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryLolAdvsPaginatePagination]: + """Return vulnerability data stored in index \"lol-advs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the macert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Moroccan CERT Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/macert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/macert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lol-advs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Living Off the Land Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lol-advs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lol-advs?cursor=` :param page: set the page number of the response :type page: int @@ -173496,7 +173496,7 @@ def index_macert_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_macert_get_serialize( + _param = self._index_lol_advs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -173528,7 +173528,7 @@ def index_macert_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMACertPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLolAdvsPaginatePagination", '404': "str", '500': "str", } @@ -173544,7 +173544,7 @@ def index_macert_get_with_http_info( @validate_call - def index_macert_get_without_preload_content( + def index_lol_advs_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -173583,9 +173583,9 @@ def index_macert_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"macert\" + """Return vulnerability data stored in index \"lol-advs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the macert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Moroccan CERT Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/macert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/macert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the lol-advs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Living Off the Land Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/lol-advs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/lol-advs?cursor=` :param page: set the page number of the response :type page: int @@ -173657,7 +173657,7 @@ def index_macert_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_macert_get_serialize( + _param = self._index_lol_advs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -173689,7 +173689,7 @@ def index_macert_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMACertPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryLolAdvsPaginatePagination", '404': "str", '500': "str", } @@ -173700,7 +173700,7 @@ def index_macert_get_without_preload_content( return response_data.response - def _index_macert_get_serialize( + def _index_lol_advs_get_serialize( self, page, limit, @@ -173868,7 +173868,7 @@ def _index_macert_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/macert', + resource_path='/v3/index/lol-advs', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -173885,7 +173885,7 @@ def _index_macert_get_serialize( @validate_call - def index_malicious_packages_get( + def index_m_files_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -173923,10 +173923,10 @@ def index_malicious_packages_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMaliciousPackagePaginatePagination: - """Return vulnerability data stored in index \"malicious-packages\" + ) -> RenderResponseWithMetadataArrayAdvisoryMFilesPaginatePagination: + """Return vulnerability data stored in index \"m-files\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the malicious-packages index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Malicious Packages ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/malicious-packages?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/malicious-packages?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the m-files index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** M-Files Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/m-files?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/m-files?cursor=` :param page: set the page number of the response :type page: int @@ -173998,7 +173998,7 @@ def index_malicious_packages_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_malicious_packages_get_serialize( + _param = self._index_m_files_get_serialize( page=page, limit=limit, cursor=cursor, @@ -174030,7 +174030,7 @@ def index_malicious_packages_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMaliciousPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMFilesPaginatePagination", '404': "str", '500': "str", } @@ -174046,7 +174046,7 @@ def index_malicious_packages_get( @validate_call - def index_malicious_packages_get_with_http_info( + def index_m_files_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -174084,10 +174084,10 @@ def index_malicious_packages_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMaliciousPackagePaginatePagination]: - """Return vulnerability data stored in index \"malicious-packages\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMFilesPaginatePagination]: + """Return vulnerability data stored in index \"m-files\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the malicious-packages index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Malicious Packages ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/malicious-packages?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/malicious-packages?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the m-files index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** M-Files Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/m-files?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/m-files?cursor=` :param page: set the page number of the response :type page: int @@ -174159,7 +174159,7 @@ def index_malicious_packages_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_malicious_packages_get_serialize( + _param = self._index_m_files_get_serialize( page=page, limit=limit, cursor=cursor, @@ -174191,7 +174191,7 @@ def index_malicious_packages_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMaliciousPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMFilesPaginatePagination", '404': "str", '500': "str", } @@ -174207,7 +174207,7 @@ def index_malicious_packages_get_with_http_info( @validate_call - def index_malicious_packages_get_without_preload_content( + def index_m_files_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -174246,9 +174246,9 @@ def index_malicious_packages_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"malicious-packages\" + """Return vulnerability data stored in index \"m-files\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the malicious-packages index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Malicious Packages ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/malicious-packages?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/malicious-packages?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the m-files index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** M-Files Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/m-files?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/m-files?cursor=` :param page: set the page number of the response :type page: int @@ -174320,7 +174320,7 @@ def index_malicious_packages_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_malicious_packages_get_serialize( + _param = self._index_m_files_get_serialize( page=page, limit=limit, cursor=cursor, @@ -174352,7 +174352,7 @@ def index_malicious_packages_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMaliciousPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMFilesPaginatePagination", '404': "str", '500': "str", } @@ -174363,7 +174363,7 @@ def index_malicious_packages_get_without_preload_content( return response_data.response - def _index_malicious_packages_get_serialize( + def _index_m_files_get_serialize( self, page, limit, @@ -174531,7 +174531,7 @@ def _index_malicious_packages_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/malicious-packages', + resource_path='/v3/index/m-files', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -174548,7 +174548,7 @@ def _index_malicious_packages_get_serialize( @validate_call - def index_malicious_vscode_exts_get( + def index_macert_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -174586,10 +174586,10 @@ def index_malicious_vscode_exts_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMaliciousVSCodeExtsPaginatePagination: - """Return vulnerability data stored in index \"malicious-vscode-exts\" + ) -> RenderResponseWithMetadataArrayAdvisoryMACertPaginatePagination: + """Return vulnerability data stored in index \"macert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the malicious-vscode-exts index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Malicious Visual Studio Code Extensions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/malicious-vscode-exts?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/malicious-vscode-exts?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the macert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Moroccan CERT Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/macert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/macert?cursor=` :param page: set the page number of the response :type page: int @@ -174661,7 +174661,7 @@ def index_malicious_vscode_exts_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_malicious_vscode_exts_get_serialize( + _param = self._index_macert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -174693,7 +174693,7 @@ def index_malicious_vscode_exts_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMaliciousVSCodeExtsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMACertPaginatePagination", '404': "str", '500': "str", } @@ -174709,7 +174709,7 @@ def index_malicious_vscode_exts_get( @validate_call - def index_malicious_vscode_exts_get_with_http_info( + def index_macert_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -174747,10 +174747,10 @@ def index_malicious_vscode_exts_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMaliciousVSCodeExtsPaginatePagination]: - """Return vulnerability data stored in index \"malicious-vscode-exts\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMACertPaginatePagination]: + """Return vulnerability data stored in index \"macert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the malicious-vscode-exts index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Malicious Visual Studio Code Extensions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/malicious-vscode-exts?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/malicious-vscode-exts?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the macert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Moroccan CERT Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/macert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/macert?cursor=` :param page: set the page number of the response :type page: int @@ -174822,7 +174822,7 @@ def index_malicious_vscode_exts_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_malicious_vscode_exts_get_serialize( + _param = self._index_macert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -174854,7 +174854,7 @@ def index_malicious_vscode_exts_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMaliciousVSCodeExtsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMACertPaginatePagination", '404': "str", '500': "str", } @@ -174870,7 +174870,7 @@ def index_malicious_vscode_exts_get_with_http_info( @validate_call - def index_malicious_vscode_exts_get_without_preload_content( + def index_macert_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -174909,9 +174909,9 @@ def index_malicious_vscode_exts_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"malicious-vscode-exts\" + """Return vulnerability data stored in index \"macert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the malicious-vscode-exts index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Malicious Visual Studio Code Extensions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/malicious-vscode-exts?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/malicious-vscode-exts?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the macert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Moroccan CERT Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/macert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/macert?cursor=` :param page: set the page number of the response :type page: int @@ -174983,7 +174983,7 @@ def index_malicious_vscode_exts_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_malicious_vscode_exts_get_serialize( + _param = self._index_macert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -175015,7 +175015,7 @@ def index_malicious_vscode_exts_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMaliciousVSCodeExtsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMACertPaginatePagination", '404': "str", '500': "str", } @@ -175026,7 +175026,7 @@ def index_malicious_vscode_exts_get_without_preload_content( return response_data.response - def _index_malicious_vscode_exts_get_serialize( + def _index_macert_get_serialize( self, page, limit, @@ -175194,7 +175194,7 @@ def _index_malicious_vscode_exts_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/malicious-vscode-exts', + resource_path='/v3/index/macert', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -175211,7 +175211,7 @@ def _index_malicious_vscode_exts_get_serialize( @validate_call - def index_manageengine_get( + def index_malicious_packages_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -175249,10 +175249,10 @@ def index_manageengine_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryManageEngineAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"manageengine\" + ) -> RenderResponseWithMetadataArrayAdvisoryMaliciousPackagePaginatePagination: + """Return vulnerability data stored in index \"malicious-packages\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the manageengine index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** ManageEngine Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/manageengine?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/manageengine?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the malicious-packages index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Malicious Packages ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/malicious-packages?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/malicious-packages?cursor=` :param page: set the page number of the response :type page: int @@ -175324,7 +175324,7 @@ def index_manageengine_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_manageengine_get_serialize( + _param = self._index_malicious_packages_get_serialize( page=page, limit=limit, cursor=cursor, @@ -175356,7 +175356,7 @@ def index_manageengine_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryManageEngineAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMaliciousPackagePaginatePagination", '404': "str", '500': "str", } @@ -175372,7 +175372,7 @@ def index_manageengine_get( @validate_call - def index_manageengine_get_with_http_info( + def index_malicious_packages_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -175410,10 +175410,10 @@ def index_manageengine_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryManageEngineAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"manageengine\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMaliciousPackagePaginatePagination]: + """Return vulnerability data stored in index \"malicious-packages\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the manageengine index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** ManageEngine Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/manageengine?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/manageengine?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the malicious-packages index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Malicious Packages ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/malicious-packages?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/malicious-packages?cursor=` :param page: set the page number of the response :type page: int @@ -175485,7 +175485,7 @@ def index_manageengine_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_manageengine_get_serialize( + _param = self._index_malicious_packages_get_serialize( page=page, limit=limit, cursor=cursor, @@ -175517,7 +175517,7 @@ def index_manageengine_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryManageEngineAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMaliciousPackagePaginatePagination", '404': "str", '500': "str", } @@ -175533,7 +175533,7 @@ def index_manageengine_get_with_http_info( @validate_call - def index_manageengine_get_without_preload_content( + def index_malicious_packages_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -175572,9 +175572,9 @@ def index_manageengine_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"manageengine\" + """Return vulnerability data stored in index \"malicious-packages\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the manageengine index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** ManageEngine Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/manageengine?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/manageengine?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the malicious-packages index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Malicious Packages ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/malicious-packages?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/malicious-packages?cursor=` :param page: set the page number of the response :type page: int @@ -175646,7 +175646,7 @@ def index_manageengine_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_manageengine_get_serialize( + _param = self._index_malicious_packages_get_serialize( page=page, limit=limit, cursor=cursor, @@ -175678,7 +175678,7 @@ def index_manageengine_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryManageEngineAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMaliciousPackagePaginatePagination", '404': "str", '500': "str", } @@ -175689,7 +175689,7 @@ def index_manageengine_get_without_preload_content( return response_data.response - def _index_manageengine_get_serialize( + def _index_malicious_packages_get_serialize( self, page, limit, @@ -175857,7 +175857,7 @@ def _index_manageengine_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/manageengine', + resource_path='/v3/index/malicious-packages', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -175874,7 +175874,7 @@ def _index_manageengine_get_serialize( @validate_call - def index_maven_get( + def index_malicious_vscode_exts_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -175912,10 +175912,10 @@ def index_maven_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: - """Return vulnerability data stored in index \"maven\" + ) -> RenderResponseWithMetadataArrayAdvisoryMaliciousVSCodeExtsPaginatePagination: + """Return vulnerability data stored in index \"malicious-vscode-exts\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the maven index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Maven (Java) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/maven?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/maven?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the malicious-vscode-exts index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Malicious Visual Studio Code Extensions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/malicious-vscode-exts?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/malicious-vscode-exts?cursor=` :param page: set the page number of the response :type page: int @@ -175987,7 +175987,7 @@ def index_maven_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_maven_get_serialize( + _param = self._index_malicious_vscode_exts_get_serialize( page=page, limit=limit, cursor=cursor, @@ -176019,7 +176019,7 @@ def index_maven_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMaliciousVSCodeExtsPaginatePagination", '404': "str", '500': "str", } @@ -176035,7 +176035,7 @@ def index_maven_get( @validate_call - def index_maven_get_with_http_info( + def index_malicious_vscode_exts_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -176073,10 +176073,10 @@ def index_maven_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: - """Return vulnerability data stored in index \"maven\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMaliciousVSCodeExtsPaginatePagination]: + """Return vulnerability data stored in index \"malicious-vscode-exts\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the maven index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Maven (Java) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/maven?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/maven?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the malicious-vscode-exts index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Malicious Visual Studio Code Extensions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/malicious-vscode-exts?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/malicious-vscode-exts?cursor=` :param page: set the page number of the response :type page: int @@ -176148,7 +176148,7 @@ def index_maven_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_maven_get_serialize( + _param = self._index_malicious_vscode_exts_get_serialize( page=page, limit=limit, cursor=cursor, @@ -176180,7 +176180,7 @@ def index_maven_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMaliciousVSCodeExtsPaginatePagination", '404': "str", '500': "str", } @@ -176196,7 +176196,7 @@ def index_maven_get_with_http_info( @validate_call - def index_maven_get_without_preload_content( + def index_malicious_vscode_exts_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -176235,9 +176235,9 @@ def index_maven_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"maven\" + """Return vulnerability data stored in index \"malicious-vscode-exts\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the maven index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Maven (Java) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/maven?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/maven?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the malicious-vscode-exts index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Malicious Visual Studio Code Extensions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/malicious-vscode-exts?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/malicious-vscode-exts?cursor=` :param page: set the page number of the response :type page: int @@ -176309,7 +176309,7 @@ def index_maven_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_maven_get_serialize( + _param = self._index_malicious_vscode_exts_get_serialize( page=page, limit=limit, cursor=cursor, @@ -176341,7 +176341,7 @@ def index_maven_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMaliciousVSCodeExtsPaginatePagination", '404': "str", '500': "str", } @@ -176352,7 +176352,7 @@ def index_maven_get_without_preload_content( return response_data.response - def _index_maven_get_serialize( + def _index_malicious_vscode_exts_get_serialize( self, page, limit, @@ -176520,7 +176520,7 @@ def _index_maven_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/maven', + resource_path='/v3/index/malicious-vscode-exts', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -176537,7 +176537,7 @@ def _index_maven_get_serialize( @validate_call - def index_mbed_tls_get( + def index_manageengine_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -176575,10 +176575,10 @@ def index_mbed_tls_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMbedTLSPaginatePagination: - """Return vulnerability data stored in index \"mbed-tls\" + ) -> RenderResponseWithMetadataArrayAdvisoryManageEngineAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"manageengine\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mbed-tls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mbed TLS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mbed-tls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mbed-tls?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the manageengine index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** ManageEngine Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/manageengine?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/manageengine?cursor=` :param page: set the page number of the response :type page: int @@ -176650,7 +176650,7 @@ def index_mbed_tls_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mbed_tls_get_serialize( + _param = self._index_manageengine_get_serialize( page=page, limit=limit, cursor=cursor, @@ -176682,7 +176682,7 @@ def index_mbed_tls_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMbedTLSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryManageEngineAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -176698,7 +176698,7 @@ def index_mbed_tls_get( @validate_call - def index_mbed_tls_get_with_http_info( + def index_manageengine_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -176736,10 +176736,10 @@ def index_mbed_tls_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMbedTLSPaginatePagination]: - """Return vulnerability data stored in index \"mbed-tls\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryManageEngineAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"manageengine\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mbed-tls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mbed TLS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mbed-tls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mbed-tls?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the manageengine index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** ManageEngine Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/manageengine?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/manageengine?cursor=` :param page: set the page number of the response :type page: int @@ -176811,7 +176811,7 @@ def index_mbed_tls_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mbed_tls_get_serialize( + _param = self._index_manageengine_get_serialize( page=page, limit=limit, cursor=cursor, @@ -176843,7 +176843,7 @@ def index_mbed_tls_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMbedTLSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryManageEngineAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -176859,7 +176859,7 @@ def index_mbed_tls_get_with_http_info( @validate_call - def index_mbed_tls_get_without_preload_content( + def index_manageengine_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -176898,9 +176898,9 @@ def index_mbed_tls_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"mbed-tls\" + """Return vulnerability data stored in index \"manageengine\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mbed-tls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mbed TLS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mbed-tls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mbed-tls?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the manageengine index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** ManageEngine Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/manageengine?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/manageengine?cursor=` :param page: set the page number of the response :type page: int @@ -176972,7 +176972,7 @@ def index_mbed_tls_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mbed_tls_get_serialize( + _param = self._index_manageengine_get_serialize( page=page, limit=limit, cursor=cursor, @@ -177004,7 +177004,7 @@ def index_mbed_tls_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMbedTLSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryManageEngineAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -177015,7 +177015,7 @@ def index_mbed_tls_get_without_preload_content( return response_data.response - def _index_mbed_tls_get_serialize( + def _index_manageengine_get_serialize( self, page, limit, @@ -177183,7 +177183,7 @@ def _index_mbed_tls_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/mbed-tls', + resource_path='/v3/index/manageengine', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -177200,7 +177200,7 @@ def _index_mbed_tls_get_serialize( @validate_call - def index_mcafee_get( + def index_maven_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -177238,10 +177238,10 @@ def index_mcafee_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMcAfeePaginatePagination: - """Return vulnerability data stored in index \"mcafee\" + ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: + """Return vulnerability data stored in index \"maven\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mcafee index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** McAfee Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mcafee?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mcafee?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the maven index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Maven (Java) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/maven?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/maven?cursor=` :param page: set the page number of the response :type page: int @@ -177313,7 +177313,7 @@ def index_mcafee_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mcafee_get_serialize( + _param = self._index_maven_get_serialize( page=page, limit=limit, cursor=cursor, @@ -177345,7 +177345,7 @@ def index_mcafee_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMcAfeePaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -177361,7 +177361,7 @@ def index_mcafee_get( @validate_call - def index_mcafee_get_with_http_info( + def index_maven_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -177399,10 +177399,10 @@ def index_mcafee_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMcAfeePaginatePagination]: - """Return vulnerability data stored in index \"mcafee\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: + """Return vulnerability data stored in index \"maven\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mcafee index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** McAfee Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mcafee?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mcafee?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the maven index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Maven (Java) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/maven?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/maven?cursor=` :param page: set the page number of the response :type page: int @@ -177474,7 +177474,7 @@ def index_mcafee_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mcafee_get_serialize( + _param = self._index_maven_get_serialize( page=page, limit=limit, cursor=cursor, @@ -177506,7 +177506,7 @@ def index_mcafee_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMcAfeePaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -177522,7 +177522,7 @@ def index_mcafee_get_with_http_info( @validate_call - def index_mcafee_get_without_preload_content( + def index_maven_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -177561,9 +177561,9 @@ def index_mcafee_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"mcafee\" + """Return vulnerability data stored in index \"maven\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mcafee index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** McAfee Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mcafee?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mcafee?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the maven index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Maven (Java) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/maven?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/maven?cursor=` :param page: set the page number of the response :type page: int @@ -177635,7 +177635,7 @@ def index_mcafee_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mcafee_get_serialize( + _param = self._index_maven_get_serialize( page=page, limit=limit, cursor=cursor, @@ -177667,7 +177667,7 @@ def index_mcafee_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMcAfeePaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -177678,7 +177678,7 @@ def index_mcafee_get_without_preload_content( return response_data.response - def _index_mcafee_get_serialize( + def _index_maven_get_serialize( self, page, limit, @@ -177846,7 +177846,7 @@ def _index_mcafee_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/mcafee', + resource_path='/v3/index/maven', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -177863,7 +177863,7 @@ def _index_mcafee_get_serialize( @validate_call - def index_mediatek_get( + def index_mbed_tls_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -177901,10 +177901,10 @@ def index_mediatek_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMediatekPaginatePagination: - """Return vulnerability data stored in index \"mediatek\" + ) -> RenderResponseWithMetadataArrayAdvisoryMbedTLSPaginatePagination: + """Return vulnerability data stored in index \"mbed-tls\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mediatek index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MediaTek Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mediatek?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mediatek?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mbed-tls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mbed TLS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mbed-tls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mbed-tls?cursor=` :param page: set the page number of the response :type page: int @@ -177976,7 +177976,7 @@ def index_mediatek_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mediatek_get_serialize( + _param = self._index_mbed_tls_get_serialize( page=page, limit=limit, cursor=cursor, @@ -178008,7 +178008,7 @@ def index_mediatek_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMediatekPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMbedTLSPaginatePagination", '404': "str", '500': "str", } @@ -178024,7 +178024,7 @@ def index_mediatek_get( @validate_call - def index_mediatek_get_with_http_info( + def index_mbed_tls_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -178062,10 +178062,10 @@ def index_mediatek_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMediatekPaginatePagination]: - """Return vulnerability data stored in index \"mediatek\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMbedTLSPaginatePagination]: + """Return vulnerability data stored in index \"mbed-tls\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mediatek index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MediaTek Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mediatek?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mediatek?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mbed-tls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mbed TLS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mbed-tls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mbed-tls?cursor=` :param page: set the page number of the response :type page: int @@ -178137,7 +178137,7 @@ def index_mediatek_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mediatek_get_serialize( + _param = self._index_mbed_tls_get_serialize( page=page, limit=limit, cursor=cursor, @@ -178169,7 +178169,7 @@ def index_mediatek_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMediatekPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMbedTLSPaginatePagination", '404': "str", '500': "str", } @@ -178185,7 +178185,7 @@ def index_mediatek_get_with_http_info( @validate_call - def index_mediatek_get_without_preload_content( + def index_mbed_tls_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -178224,9 +178224,9 @@ def index_mediatek_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"mediatek\" + """Return vulnerability data stored in index \"mbed-tls\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mediatek index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MediaTek Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mediatek?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mediatek?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mbed-tls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mbed TLS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mbed-tls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mbed-tls?cursor=` :param page: set the page number of the response :type page: int @@ -178298,7 +178298,7 @@ def index_mediatek_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mediatek_get_serialize( + _param = self._index_mbed_tls_get_serialize( page=page, limit=limit, cursor=cursor, @@ -178330,7 +178330,7 @@ def index_mediatek_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMediatekPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMbedTLSPaginatePagination", '404': "str", '500': "str", } @@ -178341,7 +178341,7 @@ def index_mediatek_get_without_preload_content( return response_data.response - def _index_mediatek_get_serialize( + def _index_mbed_tls_get_serialize( self, page, limit, @@ -178509,7 +178509,7 @@ def _index_mediatek_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/mediatek', + resource_path='/v3/index/mbed-tls', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -178526,7 +178526,7 @@ def _index_mediatek_get_serialize( @validate_call - def index_medtronic_get( + def index_mcafee_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -178564,10 +178564,10 @@ def index_medtronic_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMedtronicAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"medtronic\" + ) -> RenderResponseWithMetadataArrayAdvisoryMcAfeePaginatePagination: + """Return vulnerability data stored in index \"mcafee\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the medtronic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Medtronic Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/medtronic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/medtronic?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mcafee index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** McAfee Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mcafee?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mcafee?cursor=` :param page: set the page number of the response :type page: int @@ -178639,7 +178639,7 @@ def index_medtronic_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_medtronic_get_serialize( + _param = self._index_mcafee_get_serialize( page=page, limit=limit, cursor=cursor, @@ -178671,7 +178671,7 @@ def index_medtronic_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMedtronicAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMcAfeePaginatePagination", '404': "str", '500': "str", } @@ -178687,7 +178687,7 @@ def index_medtronic_get( @validate_call - def index_medtronic_get_with_http_info( + def index_mcafee_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -178725,10 +178725,10 @@ def index_medtronic_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMedtronicAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"medtronic\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMcAfeePaginatePagination]: + """Return vulnerability data stored in index \"mcafee\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the medtronic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Medtronic Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/medtronic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/medtronic?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mcafee index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** McAfee Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mcafee?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mcafee?cursor=` :param page: set the page number of the response :type page: int @@ -178800,7 +178800,7 @@ def index_medtronic_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_medtronic_get_serialize( + _param = self._index_mcafee_get_serialize( page=page, limit=limit, cursor=cursor, @@ -178832,7 +178832,7 @@ def index_medtronic_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMedtronicAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMcAfeePaginatePagination", '404': "str", '500': "str", } @@ -178848,7 +178848,7 @@ def index_medtronic_get_with_http_info( @validate_call - def index_medtronic_get_without_preload_content( + def index_mcafee_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -178887,9 +178887,9 @@ def index_medtronic_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"medtronic\" + """Return vulnerability data stored in index \"mcafee\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the medtronic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Medtronic Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/medtronic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/medtronic?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mcafee index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** McAfee Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mcafee?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mcafee?cursor=` :param page: set the page number of the response :type page: int @@ -178961,7 +178961,7 @@ def index_medtronic_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_medtronic_get_serialize( + _param = self._index_mcafee_get_serialize( page=page, limit=limit, cursor=cursor, @@ -178993,7 +178993,7 @@ def index_medtronic_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMedtronicAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMcAfeePaginatePagination", '404': "str", '500': "str", } @@ -179004,7 +179004,7 @@ def index_medtronic_get_without_preload_content( return response_data.response - def _index_medtronic_get_serialize( + def _index_mcafee_get_serialize( self, page, limit, @@ -179172,7 +179172,7 @@ def _index_medtronic_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/medtronic', + resource_path='/v3/index/mcafee', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -179189,7 +179189,7 @@ def _index_medtronic_get_serialize( @validate_call - def index_mendix_get( + def index_mediatek_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -179227,10 +179227,10 @@ def index_mendix_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMendixPaginatePagination: - """Return vulnerability data stored in index \"mendix\" + ) -> RenderResponseWithMetadataArrayAdvisoryMediatekPaginatePagination: + """Return vulnerability data stored in index \"mediatek\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mendix index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mendix Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mendix?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mendix?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mediatek index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MediaTek Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mediatek?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mediatek?cursor=` :param page: set the page number of the response :type page: int @@ -179302,7 +179302,7 @@ def index_mendix_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mendix_get_serialize( + _param = self._index_mediatek_get_serialize( page=page, limit=limit, cursor=cursor, @@ -179334,7 +179334,7 @@ def index_mendix_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMendixPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMediatekPaginatePagination", '404': "str", '500': "str", } @@ -179350,7 +179350,7 @@ def index_mendix_get( @validate_call - def index_mendix_get_with_http_info( + def index_mediatek_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -179388,10 +179388,10 @@ def index_mendix_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMendixPaginatePagination]: - """Return vulnerability data stored in index \"mendix\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMediatekPaginatePagination]: + """Return vulnerability data stored in index \"mediatek\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mendix index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mendix Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mendix?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mendix?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mediatek index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MediaTek Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mediatek?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mediatek?cursor=` :param page: set the page number of the response :type page: int @@ -179463,7 +179463,7 @@ def index_mendix_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mendix_get_serialize( + _param = self._index_mediatek_get_serialize( page=page, limit=limit, cursor=cursor, @@ -179495,7 +179495,7 @@ def index_mendix_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMendixPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMediatekPaginatePagination", '404': "str", '500': "str", } @@ -179511,7 +179511,7 @@ def index_mendix_get_with_http_info( @validate_call - def index_mendix_get_without_preload_content( + def index_mediatek_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -179550,9 +179550,9 @@ def index_mendix_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"mendix\" + """Return vulnerability data stored in index \"mediatek\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mendix index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mendix Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mendix?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mendix?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mediatek index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MediaTek Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mediatek?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mediatek?cursor=` :param page: set the page number of the response :type page: int @@ -179624,7 +179624,7 @@ def index_mendix_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mendix_get_serialize( + _param = self._index_mediatek_get_serialize( page=page, limit=limit, cursor=cursor, @@ -179656,7 +179656,7 @@ def index_mendix_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMendixPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMediatekPaginatePagination", '404': "str", '500': "str", } @@ -179667,7 +179667,7 @@ def index_mendix_get_without_preload_content( return response_data.response - def _index_mendix_get_serialize( + def _index_mediatek_get_serialize( self, page, limit, @@ -179835,7 +179835,7 @@ def _index_mendix_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/mendix', + resource_path='/v3/index/mediatek', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -179852,7 +179852,7 @@ def _index_mendix_get_serialize( @validate_call - def index_meta_advisories_get( + def index_medtronic_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -179890,10 +179890,10 @@ def index_meta_advisories_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMetaAdvisoriesPaginatePagination: - """Return vulnerability data stored in index \"meta-advisories\" + ) -> RenderResponseWithMetadataArrayAdvisoryMedtronicAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"medtronic\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the meta-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Meta Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/meta-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/meta-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the medtronic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Medtronic Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/medtronic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/medtronic?cursor=` :param page: set the page number of the response :type page: int @@ -179965,7 +179965,7 @@ def index_meta_advisories_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_meta_advisories_get_serialize( + _param = self._index_medtronic_get_serialize( page=page, limit=limit, cursor=cursor, @@ -179997,7 +179997,7 @@ def index_meta_advisories_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMetaAdvisoriesPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMedtronicAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -180013,7 +180013,7 @@ def index_meta_advisories_get( @validate_call - def index_meta_advisories_get_with_http_info( + def index_medtronic_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -180051,10 +180051,10 @@ def index_meta_advisories_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMetaAdvisoriesPaginatePagination]: - """Return vulnerability data stored in index \"meta-advisories\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMedtronicAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"medtronic\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the meta-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Meta Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/meta-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/meta-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the medtronic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Medtronic Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/medtronic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/medtronic?cursor=` :param page: set the page number of the response :type page: int @@ -180126,7 +180126,7 @@ def index_meta_advisories_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_meta_advisories_get_serialize( + _param = self._index_medtronic_get_serialize( page=page, limit=limit, cursor=cursor, @@ -180158,7 +180158,7 @@ def index_meta_advisories_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMetaAdvisoriesPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMedtronicAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -180174,7 +180174,7 @@ def index_meta_advisories_get_with_http_info( @validate_call - def index_meta_advisories_get_without_preload_content( + def index_medtronic_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -180213,9 +180213,9 @@ def index_meta_advisories_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"meta-advisories\" + """Return vulnerability data stored in index \"medtronic\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the meta-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Meta Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/meta-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/meta-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the medtronic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Medtronic Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/medtronic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/medtronic?cursor=` :param page: set the page number of the response :type page: int @@ -180287,7 +180287,7 @@ def index_meta_advisories_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_meta_advisories_get_serialize( + _param = self._index_medtronic_get_serialize( page=page, limit=limit, cursor=cursor, @@ -180319,7 +180319,7 @@ def index_meta_advisories_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMetaAdvisoriesPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMedtronicAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -180330,7 +180330,7 @@ def index_meta_advisories_get_without_preload_content( return response_data.response - def _index_meta_advisories_get_serialize( + def _index_medtronic_get_serialize( self, page, limit, @@ -180498,7 +180498,7 @@ def _index_meta_advisories_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/meta-advisories', + resource_path='/v3/index/medtronic', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -180515,7 +180515,7 @@ def _index_meta_advisories_get_serialize( @validate_call - def index_metasploit_get( + def index_mendix_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -180553,10 +180553,10 @@ def index_metasploit_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMetasploitExploitPaginatePagination: - """Return vulnerability data stored in index \"metasploit\" + ) -> RenderResponseWithMetadataArrayAdvisoryMendixPaginatePagination: + """Return vulnerability data stored in index \"mendix\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the metasploit index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Metasploit Modules ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/metasploit?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/metasploit?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mendix index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mendix Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mendix?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mendix?cursor=` :param page: set the page number of the response :type page: int @@ -180628,7 +180628,7 @@ def index_metasploit_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_metasploit_get_serialize( + _param = self._index_mendix_get_serialize( page=page, limit=limit, cursor=cursor, @@ -180660,7 +180660,7 @@ def index_metasploit_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMetasploitExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMendixPaginatePagination", '404': "str", '500': "str", } @@ -180676,7 +180676,7 @@ def index_metasploit_get( @validate_call - def index_metasploit_get_with_http_info( + def index_mendix_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -180714,10 +180714,10 @@ def index_metasploit_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMetasploitExploitPaginatePagination]: - """Return vulnerability data stored in index \"metasploit\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMendixPaginatePagination]: + """Return vulnerability data stored in index \"mendix\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the metasploit index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Metasploit Modules ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/metasploit?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/metasploit?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mendix index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mendix Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mendix?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mendix?cursor=` :param page: set the page number of the response :type page: int @@ -180789,7 +180789,7 @@ def index_metasploit_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_metasploit_get_serialize( + _param = self._index_mendix_get_serialize( page=page, limit=limit, cursor=cursor, @@ -180821,7 +180821,7 @@ def index_metasploit_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMetasploitExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMendixPaginatePagination", '404': "str", '500': "str", } @@ -180837,7 +180837,7 @@ def index_metasploit_get_with_http_info( @validate_call - def index_metasploit_get_without_preload_content( + def index_mendix_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -180876,9 +180876,9 @@ def index_metasploit_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"metasploit\" + """Return vulnerability data stored in index \"mendix\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the metasploit index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Metasploit Modules ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/metasploit?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/metasploit?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mendix index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mendix Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mendix?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mendix?cursor=` :param page: set the page number of the response :type page: int @@ -180950,7 +180950,7 @@ def index_metasploit_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_metasploit_get_serialize( + _param = self._index_mendix_get_serialize( page=page, limit=limit, cursor=cursor, @@ -180982,7 +180982,7 @@ def index_metasploit_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMetasploitExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMendixPaginatePagination", '404': "str", '500': "str", } @@ -180993,7 +180993,7 @@ def index_metasploit_get_without_preload_content( return response_data.response - def _index_metasploit_get_serialize( + def _index_mendix_get_serialize( self, page, limit, @@ -181161,7 +181161,7 @@ def _index_metasploit_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/metasploit', + resource_path='/v3/index/mendix', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -181178,7 +181178,7 @@ def _index_metasploit_get_serialize( @validate_call - def index_microsoft_csaf_get( + def index_meta_advisories_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -181216,10 +181216,10 @@ def index_microsoft_csaf_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMicrosoftCSAFPaginatePagination: - """Return vulnerability data stored in index \"microsoft-csaf\" + ) -> RenderResponseWithMetadataArrayAdvisoryMetaAdvisoriesPaginatePagination: + """Return vulnerability data stored in index \"meta-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-csaf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft CSAF ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-csaf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-csaf?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the meta-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Meta Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/meta-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/meta-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -181291,7 +181291,7 @@ def index_microsoft_csaf_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_microsoft_csaf_get_serialize( + _param = self._index_meta_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -181323,7 +181323,7 @@ def index_microsoft_csaf_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftCSAFPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMetaAdvisoriesPaginatePagination", '404': "str", '500': "str", } @@ -181339,7 +181339,7 @@ def index_microsoft_csaf_get( @validate_call - def index_microsoft_csaf_get_with_http_info( + def index_meta_advisories_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -181377,10 +181377,10 @@ def index_microsoft_csaf_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMicrosoftCSAFPaginatePagination]: - """Return vulnerability data stored in index \"microsoft-csaf\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMetaAdvisoriesPaginatePagination]: + """Return vulnerability data stored in index \"meta-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-csaf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft CSAF ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-csaf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-csaf?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the meta-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Meta Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/meta-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/meta-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -181452,7 +181452,7 @@ def index_microsoft_csaf_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_microsoft_csaf_get_serialize( + _param = self._index_meta_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -181484,7 +181484,7 @@ def index_microsoft_csaf_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftCSAFPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMetaAdvisoriesPaginatePagination", '404': "str", '500': "str", } @@ -181500,7 +181500,7 @@ def index_microsoft_csaf_get_with_http_info( @validate_call - def index_microsoft_csaf_get_without_preload_content( + def index_meta_advisories_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -181539,9 +181539,9 @@ def index_microsoft_csaf_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"microsoft-csaf\" + """Return vulnerability data stored in index \"meta-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-csaf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft CSAF ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-csaf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-csaf?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the meta-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Meta Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/meta-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/meta-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -181613,7 +181613,7 @@ def index_microsoft_csaf_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_microsoft_csaf_get_serialize( + _param = self._index_meta_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -181645,7 +181645,7 @@ def index_microsoft_csaf_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftCSAFPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMetaAdvisoriesPaginatePagination", '404': "str", '500': "str", } @@ -181656,7 +181656,7 @@ def index_microsoft_csaf_get_without_preload_content( return response_data.response - def _index_microsoft_csaf_get_serialize( + def _index_meta_advisories_get_serialize( self, page, limit, @@ -181824,7 +181824,7 @@ def _index_microsoft_csaf_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/microsoft-csaf', + resource_path='/v3/index/meta-advisories', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -181841,7 +181841,7 @@ def _index_microsoft_csaf_get_serialize( @validate_call - def index_microsoft_cvrf_get( + def index_metasploit_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -181879,10 +181879,10 @@ def index_microsoft_cvrf_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMicrosoftCVRFPaginatePagination: - """Return vulnerability data stored in index \"microsoft-cvrf\" + ) -> RenderResponseWithMetadataArrayAdvisoryMetasploitExploitPaginatePagination: + """Return vulnerability data stored in index \"metasploit\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-cvrf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-cvrf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-cvrf?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the metasploit index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Metasploit Modules ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/metasploit?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/metasploit?cursor=` :param page: set the page number of the response :type page: int @@ -181954,7 +181954,7 @@ def index_microsoft_cvrf_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_microsoft_cvrf_get_serialize( + _param = self._index_metasploit_get_serialize( page=page, limit=limit, cursor=cursor, @@ -181986,7 +181986,7 @@ def index_microsoft_cvrf_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftCVRFPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMetasploitExploitPaginatePagination", '404': "str", '500': "str", } @@ -182002,7 +182002,7 @@ def index_microsoft_cvrf_get( @validate_call - def index_microsoft_cvrf_get_with_http_info( + def index_metasploit_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -182040,10 +182040,10 @@ def index_microsoft_cvrf_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMicrosoftCVRFPaginatePagination]: - """Return vulnerability data stored in index \"microsoft-cvrf\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMetasploitExploitPaginatePagination]: + """Return vulnerability data stored in index \"metasploit\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-cvrf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-cvrf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-cvrf?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the metasploit index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Metasploit Modules ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/metasploit?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/metasploit?cursor=` :param page: set the page number of the response :type page: int @@ -182115,7 +182115,7 @@ def index_microsoft_cvrf_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_microsoft_cvrf_get_serialize( + _param = self._index_metasploit_get_serialize( page=page, limit=limit, cursor=cursor, @@ -182147,7 +182147,7 @@ def index_microsoft_cvrf_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftCVRFPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMetasploitExploitPaginatePagination", '404': "str", '500': "str", } @@ -182163,7 +182163,7 @@ def index_microsoft_cvrf_get_with_http_info( @validate_call - def index_microsoft_cvrf_get_without_preload_content( + def index_metasploit_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -182202,9 +182202,9 @@ def index_microsoft_cvrf_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"microsoft-cvrf\" + """Return vulnerability data stored in index \"metasploit\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-cvrf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-cvrf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-cvrf?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the metasploit index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Metasploit Modules ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/metasploit?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/metasploit?cursor=` :param page: set the page number of the response :type page: int @@ -182276,7 +182276,7 @@ def index_microsoft_cvrf_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_microsoft_cvrf_get_serialize( + _param = self._index_metasploit_get_serialize( page=page, limit=limit, cursor=cursor, @@ -182308,7 +182308,7 @@ def index_microsoft_cvrf_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftCVRFPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMetasploitExploitPaginatePagination", '404': "str", '500': "str", } @@ -182319,7 +182319,7 @@ def index_microsoft_cvrf_get_without_preload_content( return response_data.response - def _index_microsoft_cvrf_get_serialize( + def _index_metasploit_get_serialize( self, page, limit, @@ -182487,7 +182487,7 @@ def _index_microsoft_cvrf_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/microsoft-cvrf', + resource_path='/v3/index/metasploit', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -182504,7 +182504,7 @@ def _index_microsoft_cvrf_get_serialize( @validate_call - def index_microsoft_driver_block_list_get( + def index_microsoft_csaf_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -182542,10 +182542,10 @@ def index_microsoft_driver_block_list_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMicrosoftDriverBlockListPaginatePagination: - """Return vulnerability data stored in index \"microsoft-driver-block-list\" + ) -> RenderResponseWithMetadataArrayAdvisoryMicrosoftCSAFPaginatePagination: + """Return vulnerability data stored in index \"microsoft-csaf\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-driver-block-list index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft's Vulnerable Drivers Blocklist ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-driver-block-list?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-driver-block-list?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-csaf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft CSAF ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-csaf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-csaf?cursor=` :param page: set the page number of the response :type page: int @@ -182617,7 +182617,7 @@ def index_microsoft_driver_block_list_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_microsoft_driver_block_list_get_serialize( + _param = self._index_microsoft_csaf_get_serialize( page=page, limit=limit, cursor=cursor, @@ -182649,7 +182649,7 @@ def index_microsoft_driver_block_list_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftDriverBlockListPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftCSAFPaginatePagination", '404': "str", '500': "str", } @@ -182665,7 +182665,7 @@ def index_microsoft_driver_block_list_get( @validate_call - def index_microsoft_driver_block_list_get_with_http_info( + def index_microsoft_csaf_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -182703,10 +182703,10 @@ def index_microsoft_driver_block_list_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMicrosoftDriverBlockListPaginatePagination]: - """Return vulnerability data stored in index \"microsoft-driver-block-list\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMicrosoftCSAFPaginatePagination]: + """Return vulnerability data stored in index \"microsoft-csaf\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-driver-block-list index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft's Vulnerable Drivers Blocklist ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-driver-block-list?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-driver-block-list?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-csaf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft CSAF ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-csaf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-csaf?cursor=` :param page: set the page number of the response :type page: int @@ -182778,7 +182778,7 @@ def index_microsoft_driver_block_list_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_microsoft_driver_block_list_get_serialize( + _param = self._index_microsoft_csaf_get_serialize( page=page, limit=limit, cursor=cursor, @@ -182810,7 +182810,7 @@ def index_microsoft_driver_block_list_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftDriverBlockListPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftCSAFPaginatePagination", '404': "str", '500': "str", } @@ -182826,7 +182826,7 @@ def index_microsoft_driver_block_list_get_with_http_info( @validate_call - def index_microsoft_driver_block_list_get_without_preload_content( + def index_microsoft_csaf_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -182865,9 +182865,9 @@ def index_microsoft_driver_block_list_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"microsoft-driver-block-list\" + """Return vulnerability data stored in index \"microsoft-csaf\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-driver-block-list index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft's Vulnerable Drivers Blocklist ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-driver-block-list?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-driver-block-list?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-csaf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft CSAF ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-csaf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-csaf?cursor=` :param page: set the page number of the response :type page: int @@ -182939,7 +182939,7 @@ def index_microsoft_driver_block_list_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_microsoft_driver_block_list_get_serialize( + _param = self._index_microsoft_csaf_get_serialize( page=page, limit=limit, cursor=cursor, @@ -182971,7 +182971,7 @@ def index_microsoft_driver_block_list_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftDriverBlockListPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftCSAFPaginatePagination", '404': "str", '500': "str", } @@ -182982,7 +182982,7 @@ def index_microsoft_driver_block_list_get_without_preload_content( return response_data.response - def _index_microsoft_driver_block_list_get_serialize( + def _index_microsoft_csaf_get_serialize( self, page, limit, @@ -183150,7 +183150,7 @@ def _index_microsoft_driver_block_list_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/microsoft-driver-block-list', + resource_path='/v3/index/microsoft-csaf', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -183167,7 +183167,7 @@ def _index_microsoft_driver_block_list_get_serialize( @validate_call - def index_microsoft_kb_get( + def index_microsoft_cvrf_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -183205,10 +183205,10 @@ def index_microsoft_kb_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMicrosoftKbPaginatePagination: - """Return vulnerability data stored in index \"microsoft-kb\" + ) -> RenderResponseWithMetadataArrayAdvisoryMicrosoftCVRFPaginatePagination: + """Return vulnerability data stored in index \"microsoft-cvrf\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-kb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft KB list by CVE ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-kb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-kb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-cvrf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-cvrf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-cvrf?cursor=` :param page: set the page number of the response :type page: int @@ -183280,7 +183280,7 @@ def index_microsoft_kb_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_microsoft_kb_get_serialize( + _param = self._index_microsoft_cvrf_get_serialize( page=page, limit=limit, cursor=cursor, @@ -183312,7 +183312,7 @@ def index_microsoft_kb_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftKbPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftCVRFPaginatePagination", '404': "str", '500': "str", } @@ -183328,7 +183328,7 @@ def index_microsoft_kb_get( @validate_call - def index_microsoft_kb_get_with_http_info( + def index_microsoft_cvrf_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -183366,10 +183366,10 @@ def index_microsoft_kb_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMicrosoftKbPaginatePagination]: - """Return vulnerability data stored in index \"microsoft-kb\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMicrosoftCVRFPaginatePagination]: + """Return vulnerability data stored in index \"microsoft-cvrf\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-kb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft KB list by CVE ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-kb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-kb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-cvrf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-cvrf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-cvrf?cursor=` :param page: set the page number of the response :type page: int @@ -183441,7 +183441,7 @@ def index_microsoft_kb_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_microsoft_kb_get_serialize( + _param = self._index_microsoft_cvrf_get_serialize( page=page, limit=limit, cursor=cursor, @@ -183473,7 +183473,7 @@ def index_microsoft_kb_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftKbPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftCVRFPaginatePagination", '404': "str", '500': "str", } @@ -183489,7 +183489,7 @@ def index_microsoft_kb_get_with_http_info( @validate_call - def index_microsoft_kb_get_without_preload_content( + def index_microsoft_cvrf_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -183528,9 +183528,9 @@ def index_microsoft_kb_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"microsoft-kb\" + """Return vulnerability data stored in index \"microsoft-cvrf\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-kb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft KB list by CVE ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-kb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-kb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-cvrf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-cvrf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-cvrf?cursor=` :param page: set the page number of the response :type page: int @@ -183602,7 +183602,7 @@ def index_microsoft_kb_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_microsoft_kb_get_serialize( + _param = self._index_microsoft_cvrf_get_serialize( page=page, limit=limit, cursor=cursor, @@ -183634,7 +183634,7 @@ def index_microsoft_kb_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftKbPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftCVRFPaginatePagination", '404': "str", '500': "str", } @@ -183645,7 +183645,7 @@ def index_microsoft_kb_get_without_preload_content( return response_data.response - def _index_microsoft_kb_get_serialize( + def _index_microsoft_cvrf_get_serialize( self, page, limit, @@ -183813,7 +183813,7 @@ def _index_microsoft_kb_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/microsoft-kb', + resource_path='/v3/index/microsoft-cvrf', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -183830,7 +183830,7 @@ def _index_microsoft_kb_get_serialize( @validate_call - def index_mikrotik_get( + def index_microsoft_driver_block_list_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -183868,10 +183868,10 @@ def index_mikrotik_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMikrotikPaginatePagination: - """Return vulnerability data stored in index \"mikrotik\" + ) -> RenderResponseWithMetadataArrayAdvisoryMicrosoftDriverBlockListPaginatePagination: + """Return vulnerability data stored in index \"microsoft-driver-block-list\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mikrotik index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MikroTik Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mikrotik?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mikrotik?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-driver-block-list index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft's Vulnerable Drivers Blocklist ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-driver-block-list?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-driver-block-list?cursor=` :param page: set the page number of the response :type page: int @@ -183943,7 +183943,7 @@ def index_mikrotik_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mikrotik_get_serialize( + _param = self._index_microsoft_driver_block_list_get_serialize( page=page, limit=limit, cursor=cursor, @@ -183975,7 +183975,7 @@ def index_mikrotik_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMikrotikPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftDriverBlockListPaginatePagination", '404': "str", '500': "str", } @@ -183991,7 +183991,7 @@ def index_mikrotik_get( @validate_call - def index_mikrotik_get_with_http_info( + def index_microsoft_driver_block_list_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -184029,10 +184029,10 @@ def index_mikrotik_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMikrotikPaginatePagination]: - """Return vulnerability data stored in index \"mikrotik\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMicrosoftDriverBlockListPaginatePagination]: + """Return vulnerability data stored in index \"microsoft-driver-block-list\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mikrotik index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MikroTik Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mikrotik?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mikrotik?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-driver-block-list index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft's Vulnerable Drivers Blocklist ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-driver-block-list?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-driver-block-list?cursor=` :param page: set the page number of the response :type page: int @@ -184104,7 +184104,7 @@ def index_mikrotik_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mikrotik_get_serialize( + _param = self._index_microsoft_driver_block_list_get_serialize( page=page, limit=limit, cursor=cursor, @@ -184136,7 +184136,7 @@ def index_mikrotik_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMikrotikPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftDriverBlockListPaginatePagination", '404': "str", '500': "str", } @@ -184152,7 +184152,7 @@ def index_mikrotik_get_with_http_info( @validate_call - def index_mikrotik_get_without_preload_content( + def index_microsoft_driver_block_list_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -184191,9 +184191,9 @@ def index_mikrotik_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"mikrotik\" + """Return vulnerability data stored in index \"microsoft-driver-block-list\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mikrotik index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MikroTik Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mikrotik?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mikrotik?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-driver-block-list index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft's Vulnerable Drivers Blocklist ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-driver-block-list?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-driver-block-list?cursor=` :param page: set the page number of the response :type page: int @@ -184265,7 +184265,7 @@ def index_mikrotik_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mikrotik_get_serialize( + _param = self._index_microsoft_driver_block_list_get_serialize( page=page, limit=limit, cursor=cursor, @@ -184297,7 +184297,7 @@ def index_mikrotik_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMikrotikPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftDriverBlockListPaginatePagination", '404': "str", '500': "str", } @@ -184308,7 +184308,7 @@ def index_mikrotik_get_without_preload_content( return response_data.response - def _index_mikrotik_get_serialize( + def _index_microsoft_driver_block_list_get_serialize( self, page, limit, @@ -184476,7 +184476,7 @@ def _index_mikrotik_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/mikrotik', + resource_path='/v3/index/microsoft-driver-block-list', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -184493,7 +184493,7 @@ def _index_mikrotik_get_serialize( @validate_call - def index_mindray_get( + def index_microsoft_kb_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -184531,10 +184531,10 @@ def index_mindray_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMindrayPaginatePagination: - """Return vulnerability data stored in index \"mindray\" + ) -> RenderResponseWithMetadataArrayAdvisoryMicrosoftKbPaginatePagination: + """Return vulnerability data stored in index \"microsoft-kb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mindray index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mindray Cybersecurity Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mindray?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mindray?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-kb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft KB list by CVE ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-kb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-kb?cursor=` :param page: set the page number of the response :type page: int @@ -184606,7 +184606,7 @@ def index_mindray_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mindray_get_serialize( + _param = self._index_microsoft_kb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -184638,7 +184638,7 @@ def index_mindray_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMindrayPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftKbPaginatePagination", '404': "str", '500': "str", } @@ -184654,7 +184654,7 @@ def index_mindray_get( @validate_call - def index_mindray_get_with_http_info( + def index_microsoft_kb_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -184692,10 +184692,10 @@ def index_mindray_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMindrayPaginatePagination]: - """Return vulnerability data stored in index \"mindray\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMicrosoftKbPaginatePagination]: + """Return vulnerability data stored in index \"microsoft-kb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mindray index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mindray Cybersecurity Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mindray?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mindray?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-kb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft KB list by CVE ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-kb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-kb?cursor=` :param page: set the page number of the response :type page: int @@ -184767,7 +184767,7 @@ def index_mindray_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mindray_get_serialize( + _param = self._index_microsoft_kb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -184799,7 +184799,7 @@ def index_mindray_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMindrayPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftKbPaginatePagination", '404': "str", '500': "str", } @@ -184815,7 +184815,7 @@ def index_mindray_get_with_http_info( @validate_call - def index_mindray_get_without_preload_content( + def index_microsoft_kb_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -184854,9 +184854,9 @@ def index_mindray_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"mindray\" + """Return vulnerability data stored in index \"microsoft-kb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mindray index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mindray Cybersecurity Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mindray?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mindray?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the microsoft-kb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Microsoft KB list by CVE ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-kb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/microsoft-kb?cursor=` :param page: set the page number of the response :type page: int @@ -184928,7 +184928,7 @@ def index_mindray_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mindray_get_serialize( + _param = self._index_microsoft_kb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -184960,7 +184960,7 @@ def index_mindray_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMindrayPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMicrosoftKbPaginatePagination", '404': "str", '500': "str", } @@ -184971,7 +184971,7 @@ def index_mindray_get_without_preload_content( return response_data.response - def _index_mindray_get_serialize( + def _index_microsoft_kb_get_serialize( self, page, limit, @@ -185139,7 +185139,7 @@ def _index_mindray_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/mindray', + resource_path='/v3/index/microsoft-kb', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -185156,7 +185156,7 @@ def _index_mindray_get_serialize( @validate_call - def index_misp_threat_actors_get( + def index_mikrotik_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -185194,10 +185194,10 @@ def index_misp_threat_actors_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMispValuePaginatePagination: - """Return vulnerability data stored in index \"misp-threat-actors\" + ) -> RenderResponseWithMetadataArrayAdvisoryMikrotikPaginatePagination: + """Return vulnerability data stored in index \"mikrotik\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the misp-threat-actors index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MISP Threat Actors ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/misp-threat-actors?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/misp-threat-actors?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mikrotik index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MikroTik Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mikrotik?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mikrotik?cursor=` :param page: set the page number of the response :type page: int @@ -185269,7 +185269,7 @@ def index_misp_threat_actors_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_misp_threat_actors_get_serialize( + _param = self._index_mikrotik_get_serialize( page=page, limit=limit, cursor=cursor, @@ -185301,7 +185301,7 @@ def index_misp_threat_actors_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMispValuePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMikrotikPaginatePagination", '404': "str", '500': "str", } @@ -185317,7 +185317,7 @@ def index_misp_threat_actors_get( @validate_call - def index_misp_threat_actors_get_with_http_info( + def index_mikrotik_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -185355,10 +185355,10 @@ def index_misp_threat_actors_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMispValuePaginatePagination]: - """Return vulnerability data stored in index \"misp-threat-actors\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMikrotikPaginatePagination]: + """Return vulnerability data stored in index \"mikrotik\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the misp-threat-actors index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MISP Threat Actors ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/misp-threat-actors?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/misp-threat-actors?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mikrotik index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MikroTik Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mikrotik?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mikrotik?cursor=` :param page: set the page number of the response :type page: int @@ -185430,7 +185430,7 @@ def index_misp_threat_actors_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_misp_threat_actors_get_serialize( + _param = self._index_mikrotik_get_serialize( page=page, limit=limit, cursor=cursor, @@ -185462,7 +185462,7 @@ def index_misp_threat_actors_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMispValuePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMikrotikPaginatePagination", '404': "str", '500': "str", } @@ -185478,7 +185478,7 @@ def index_misp_threat_actors_get_with_http_info( @validate_call - def index_misp_threat_actors_get_without_preload_content( + def index_mikrotik_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -185517,9 +185517,9 @@ def index_misp_threat_actors_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"misp-threat-actors\" + """Return vulnerability data stored in index \"mikrotik\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the misp-threat-actors index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MISP Threat Actors ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/misp-threat-actors?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/misp-threat-actors?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mikrotik index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MikroTik Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mikrotik?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mikrotik?cursor=` :param page: set the page number of the response :type page: int @@ -185591,7 +185591,7 @@ def index_misp_threat_actors_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_misp_threat_actors_get_serialize( + _param = self._index_mikrotik_get_serialize( page=page, limit=limit, cursor=cursor, @@ -185623,7 +185623,7 @@ def index_misp_threat_actors_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMispValuePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMikrotikPaginatePagination", '404': "str", '500': "str", } @@ -185634,7 +185634,7 @@ def index_misp_threat_actors_get_without_preload_content( return response_data.response - def _index_misp_threat_actors_get_serialize( + def _index_mikrotik_get_serialize( self, page, limit, @@ -185802,7 +185802,7 @@ def _index_misp_threat_actors_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/misp-threat-actors', + resource_path='/v3/index/mikrotik', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -185819,7 +185819,7 @@ def _index_misp_threat_actors_get_serialize( @validate_call - def index_mitel_get( + def index_mindray_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -185857,10 +185857,10 @@ def index_mitel_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMitelPaginatePagination: - """Return vulnerability data stored in index \"mitel\" + ) -> RenderResponseWithMetadataArrayAdvisoryMindrayPaginatePagination: + """Return vulnerability data stored in index \"mindray\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mitel Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitel?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mindray index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mindray Cybersecurity Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mindray?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mindray?cursor=` :param page: set the page number of the response :type page: int @@ -185932,7 +185932,7 @@ def index_mitel_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mitel_get_serialize( + _param = self._index_mindray_get_serialize( page=page, limit=limit, cursor=cursor, @@ -185964,7 +185964,7 @@ def index_mitel_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMitelPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMindrayPaginatePagination", '404': "str", '500': "str", } @@ -185980,7 +185980,7 @@ def index_mitel_get( @validate_call - def index_mitel_get_with_http_info( + def index_mindray_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -186018,10 +186018,10 @@ def index_mitel_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMitelPaginatePagination]: - """Return vulnerability data stored in index \"mitel\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMindrayPaginatePagination]: + """Return vulnerability data stored in index \"mindray\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mitel Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitel?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mindray index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mindray Cybersecurity Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mindray?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mindray?cursor=` :param page: set the page number of the response :type page: int @@ -186093,7 +186093,7 @@ def index_mitel_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mitel_get_serialize( + _param = self._index_mindray_get_serialize( page=page, limit=limit, cursor=cursor, @@ -186125,7 +186125,7 @@ def index_mitel_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMitelPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMindrayPaginatePagination", '404': "str", '500': "str", } @@ -186141,7 +186141,7 @@ def index_mitel_get_with_http_info( @validate_call - def index_mitel_get_without_preload_content( + def index_mindray_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -186180,9 +186180,9 @@ def index_mitel_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"mitel\" + """Return vulnerability data stored in index \"mindray\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mitel Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitel?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mindray index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mindray Cybersecurity Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mindray?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mindray?cursor=` :param page: set the page number of the response :type page: int @@ -186254,7 +186254,7 @@ def index_mitel_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mitel_get_serialize( + _param = self._index_mindray_get_serialize( page=page, limit=limit, cursor=cursor, @@ -186286,7 +186286,7 @@ def index_mitel_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMitelPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMindrayPaginatePagination", '404': "str", '500': "str", } @@ -186297,7 +186297,7 @@ def index_mitel_get_without_preload_content( return response_data.response - def _index_mitel_get_serialize( + def _index_mindray_get_serialize( self, page, limit, @@ -186465,7 +186465,7 @@ def _index_mitel_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/mitel', + resource_path='/v3/index/mindray', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -186482,7 +186482,7 @@ def _index_mitel_get_serialize( @validate_call - def index_mitre_attack_cve_get( + def index_misp_threat_actors_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -186520,10 +186520,10 @@ def index_mitre_attack_cve_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiMitreAttackToCVEPaginatePagination: - """Return vulnerability data stored in index \"mitre-attack-cve\" + ) -> RenderResponseWithMetadataArrayAdvisoryMispValuePaginatePagination: + """Return vulnerability data stored in index \"misp-threat-actors\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitre-attack-cve index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MITRE ATT&CK Technique ID to CVE List ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-attack-cve?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitre-attack-cve?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the misp-threat-actors index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MISP Threat Actors ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/misp-threat-actors?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/misp-threat-actors?cursor=` :param page: set the page number of the response :type page: int @@ -186595,7 +186595,7 @@ def index_mitre_attack_cve_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mitre_attack_cve_get_serialize( + _param = self._index_misp_threat_actors_get_serialize( page=page, limit=limit, cursor=cursor, @@ -186627,7 +186627,7 @@ def index_mitre_attack_cve_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiMitreAttackToCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMispValuePaginatePagination", '404': "str", '500': "str", } @@ -186643,7 +186643,7 @@ def index_mitre_attack_cve_get( @validate_call - def index_mitre_attack_cve_get_with_http_info( + def index_misp_threat_actors_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -186681,10 +186681,10 @@ def index_mitre_attack_cve_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiMitreAttackToCVEPaginatePagination]: - """Return vulnerability data stored in index \"mitre-attack-cve\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMispValuePaginatePagination]: + """Return vulnerability data stored in index \"misp-threat-actors\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitre-attack-cve index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MITRE ATT&CK Technique ID to CVE List ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-attack-cve?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitre-attack-cve?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the misp-threat-actors index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MISP Threat Actors ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/misp-threat-actors?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/misp-threat-actors?cursor=` :param page: set the page number of the response :type page: int @@ -186756,7 +186756,7 @@ def index_mitre_attack_cve_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mitre_attack_cve_get_serialize( + _param = self._index_misp_threat_actors_get_serialize( page=page, limit=limit, cursor=cursor, @@ -186788,7 +186788,7 @@ def index_mitre_attack_cve_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiMitreAttackToCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMispValuePaginatePagination", '404': "str", '500': "str", } @@ -186804,7 +186804,7 @@ def index_mitre_attack_cve_get_with_http_info( @validate_call - def index_mitre_attack_cve_get_without_preload_content( + def index_misp_threat_actors_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -186843,9 +186843,9 @@ def index_mitre_attack_cve_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"mitre-attack-cve\" + """Return vulnerability data stored in index \"misp-threat-actors\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitre-attack-cve index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MITRE ATT&CK Technique ID to CVE List ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-attack-cve?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitre-attack-cve?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the misp-threat-actors index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MISP Threat Actors ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/misp-threat-actors?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/misp-threat-actors?cursor=` :param page: set the page number of the response :type page: int @@ -186917,7 +186917,7 @@ def index_mitre_attack_cve_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mitre_attack_cve_get_serialize( + _param = self._index_misp_threat_actors_get_serialize( page=page, limit=limit, cursor=cursor, @@ -186949,7 +186949,7 @@ def index_mitre_attack_cve_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiMitreAttackToCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMispValuePaginatePagination", '404': "str", '500': "str", } @@ -186960,7 +186960,7 @@ def index_mitre_attack_cve_get_without_preload_content( return response_data.response - def _index_mitre_attack_cve_get_serialize( + def _index_misp_threat_actors_get_serialize( self, page, limit, @@ -187128,7 +187128,7 @@ def _index_mitre_attack_cve_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/mitre-attack-cve', + resource_path='/v3/index/misp-threat-actors', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -187145,7 +187145,7 @@ def _index_mitre_attack_cve_get_serialize( @validate_call - def index_mitre_cvelist_v5_get( + def index_mitel_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -187183,10 +187183,10 @@ def index_mitre_cvelist_v5_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMitreCVEListV5PaginatePagination: - """Return vulnerability data stored in index \"mitre-cvelist-v5\" + ) -> RenderResponseWithMetadataArrayAdvisoryMitelPaginatePagination: + """Return vulnerability data stored in index \"mitel\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitre-cvelist-v5 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MITRE CVEList V5 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-cvelist-v5?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitre-cvelist-v5?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mitel Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitel?cursor=` :param page: set the page number of the response :type page: int @@ -187258,7 +187258,7 @@ def index_mitre_cvelist_v5_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mitre_cvelist_v5_get_serialize( + _param = self._index_mitel_get_serialize( page=page, limit=limit, cursor=cursor, @@ -187290,7 +187290,7 @@ def index_mitre_cvelist_v5_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMitreCVEListV5PaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMitelPaginatePagination", '404': "str", '500': "str", } @@ -187306,7 +187306,7 @@ def index_mitre_cvelist_v5_get( @validate_call - def index_mitre_cvelist_v5_get_with_http_info( + def index_mitel_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -187344,10 +187344,10 @@ def index_mitre_cvelist_v5_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMitreCVEListV5PaginatePagination]: - """Return vulnerability data stored in index \"mitre-cvelist-v5\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMitelPaginatePagination]: + """Return vulnerability data stored in index \"mitel\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitre-cvelist-v5 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MITRE CVEList V5 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-cvelist-v5?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitre-cvelist-v5?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mitel Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitel?cursor=` :param page: set the page number of the response :type page: int @@ -187419,7 +187419,7 @@ def index_mitre_cvelist_v5_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mitre_cvelist_v5_get_serialize( + _param = self._index_mitel_get_serialize( page=page, limit=limit, cursor=cursor, @@ -187451,7 +187451,7 @@ def index_mitre_cvelist_v5_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMitreCVEListV5PaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMitelPaginatePagination", '404': "str", '500': "str", } @@ -187467,7 +187467,7 @@ def index_mitre_cvelist_v5_get_with_http_info( @validate_call - def index_mitre_cvelist_v5_get_without_preload_content( + def index_mitel_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -187506,9 +187506,9 @@ def index_mitre_cvelist_v5_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"mitre-cvelist-v5\" + """Return vulnerability data stored in index \"mitel\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitre-cvelist-v5 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MITRE CVEList V5 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-cvelist-v5?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitre-cvelist-v5?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mitel Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitel?cursor=` :param page: set the page number of the response :type page: int @@ -187580,7 +187580,7 @@ def index_mitre_cvelist_v5_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mitre_cvelist_v5_get_serialize( + _param = self._index_mitel_get_serialize( page=page, limit=limit, cursor=cursor, @@ -187612,7 +187612,7 @@ def index_mitre_cvelist_v5_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMitreCVEListV5PaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMitelPaginatePagination", '404': "str", '500': "str", } @@ -187623,7 +187623,7 @@ def index_mitre_cvelist_v5_get_without_preload_content( return response_data.response - def _index_mitre_cvelist_v5_get_serialize( + def _index_mitel_get_serialize( self, page, limit, @@ -187791,7 +187791,7 @@ def _index_mitre_cvelist_v5_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/mitre-cvelist-v5', + resource_path='/v3/index/mitel', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -187808,7 +187808,7 @@ def _index_mitre_cvelist_v5_get_serialize( @validate_call - def index_mitsubishi_electric_get( + def index_mitre_attack_cve_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -187846,10 +187846,10 @@ def index_mitsubishi_electric_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMitsubishiElectricAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"mitsubishi-electric\" + ) -> RenderResponseWithMetadataArrayApiMitreAttackToCVEPaginatePagination: + """Return vulnerability data stored in index \"mitre-attack-cve\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitsubishi-electric index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mitsubishi Electric Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitsubishi-electric?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitsubishi-electric?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitre-attack-cve index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MITRE ATT&CK Technique ID to CVE List ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-attack-cve?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitre-attack-cve?cursor=` :param page: set the page number of the response :type page: int @@ -187921,7 +187921,7 @@ def index_mitsubishi_electric_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mitsubishi_electric_get_serialize( + _param = self._index_mitre_attack_cve_get_serialize( page=page, limit=limit, cursor=cursor, @@ -187953,7 +187953,7 @@ def index_mitsubishi_electric_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMitsubishiElectricAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiMitreAttackToCVEPaginatePagination", '404': "str", '500': "str", } @@ -187969,7 +187969,7 @@ def index_mitsubishi_electric_get( @validate_call - def index_mitsubishi_electric_get_with_http_info( + def index_mitre_attack_cve_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -188007,10 +188007,10 @@ def index_mitsubishi_electric_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMitsubishiElectricAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"mitsubishi-electric\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiMitreAttackToCVEPaginatePagination]: + """Return vulnerability data stored in index \"mitre-attack-cve\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitsubishi-electric index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mitsubishi Electric Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitsubishi-electric?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitsubishi-electric?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitre-attack-cve index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MITRE ATT&CK Technique ID to CVE List ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-attack-cve?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitre-attack-cve?cursor=` :param page: set the page number of the response :type page: int @@ -188082,7 +188082,7 @@ def index_mitsubishi_electric_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mitsubishi_electric_get_serialize( + _param = self._index_mitre_attack_cve_get_serialize( page=page, limit=limit, cursor=cursor, @@ -188114,7 +188114,7 @@ def index_mitsubishi_electric_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMitsubishiElectricAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiMitreAttackToCVEPaginatePagination", '404': "str", '500': "str", } @@ -188130,7 +188130,7 @@ def index_mitsubishi_electric_get_with_http_info( @validate_call - def index_mitsubishi_electric_get_without_preload_content( + def index_mitre_attack_cve_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -188169,9 +188169,9 @@ def index_mitsubishi_electric_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"mitsubishi-electric\" + """Return vulnerability data stored in index \"mitre-attack-cve\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitsubishi-electric index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mitsubishi Electric Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitsubishi-electric?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitsubishi-electric?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitre-attack-cve index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MITRE ATT&CK Technique ID to CVE List ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-attack-cve?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitre-attack-cve?cursor=` :param page: set the page number of the response :type page: int @@ -188243,7 +188243,7 @@ def index_mitsubishi_electric_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mitsubishi_electric_get_serialize( + _param = self._index_mitre_attack_cve_get_serialize( page=page, limit=limit, cursor=cursor, @@ -188275,7 +188275,7 @@ def index_mitsubishi_electric_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMitsubishiElectricAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiMitreAttackToCVEPaginatePagination", '404': "str", '500': "str", } @@ -188286,7 +188286,7 @@ def index_mitsubishi_electric_get_without_preload_content( return response_data.response - def _index_mitsubishi_electric_get_serialize( + def _index_mitre_attack_cve_get_serialize( self, page, limit, @@ -188454,7 +188454,7 @@ def _index_mitsubishi_electric_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/mitsubishi-electric', + resource_path='/v3/index/mitre-attack-cve', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -188471,7 +188471,7 @@ def _index_mitsubishi_electric_get_serialize( @validate_call - def index_mongodb_get( + def index_mitre_cvelist_v5_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -188509,10 +188509,10 @@ def index_mongodb_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMongoDBPaginatePagination: - """Return vulnerability data stored in index \"mongodb\" + ) -> RenderResponseWithMetadataArrayAdvisoryMitreCVEListV5PaginatePagination: + """Return vulnerability data stored in index \"mitre-cvelist-v5\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mongodb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MongoDB Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mongodb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mongodb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitre-cvelist-v5 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MITRE CVEList V5 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-cvelist-v5?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitre-cvelist-v5?cursor=` :param page: set the page number of the response :type page: int @@ -188584,7 +188584,7 @@ def index_mongodb_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mongodb_get_serialize( + _param = self._index_mitre_cvelist_v5_get_serialize( page=page, limit=limit, cursor=cursor, @@ -188616,7 +188616,7 @@ def index_mongodb_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMongoDBPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMitreCVEListV5PaginatePagination", '404': "str", '500': "str", } @@ -188632,7 +188632,7 @@ def index_mongodb_get( @validate_call - def index_mongodb_get_with_http_info( + def index_mitre_cvelist_v5_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -188670,10 +188670,10 @@ def index_mongodb_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMongoDBPaginatePagination]: - """Return vulnerability data stored in index \"mongodb\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMitreCVEListV5PaginatePagination]: + """Return vulnerability data stored in index \"mitre-cvelist-v5\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mongodb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MongoDB Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mongodb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mongodb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitre-cvelist-v5 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MITRE CVEList V5 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-cvelist-v5?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitre-cvelist-v5?cursor=` :param page: set the page number of the response :type page: int @@ -188745,7 +188745,7 @@ def index_mongodb_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mongodb_get_serialize( + _param = self._index_mitre_cvelist_v5_get_serialize( page=page, limit=limit, cursor=cursor, @@ -188777,7 +188777,7 @@ def index_mongodb_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMongoDBPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMitreCVEListV5PaginatePagination", '404': "str", '500': "str", } @@ -188793,7 +188793,7 @@ def index_mongodb_get_with_http_info( @validate_call - def index_mongodb_get_without_preload_content( + def index_mitre_cvelist_v5_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -188832,9 +188832,9 @@ def index_mongodb_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"mongodb\" + """Return vulnerability data stored in index \"mitre-cvelist-v5\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mongodb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MongoDB Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mongodb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mongodb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitre-cvelist-v5 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MITRE CVEList V5 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-cvelist-v5?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitre-cvelist-v5?cursor=` :param page: set the page number of the response :type page: int @@ -188906,7 +188906,7 @@ def index_mongodb_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mongodb_get_serialize( + _param = self._index_mitre_cvelist_v5_get_serialize( page=page, limit=limit, cursor=cursor, @@ -188938,7 +188938,7 @@ def index_mongodb_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMongoDBPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMitreCVEListV5PaginatePagination", '404': "str", '500': "str", } @@ -188949,7 +188949,7 @@ def index_mongodb_get_without_preload_content( return response_data.response - def _index_mongodb_get_serialize( + def _index_mitre_cvelist_v5_get_serialize( self, page, limit, @@ -189117,7 +189117,7 @@ def _index_mongodb_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/mongodb', + resource_path='/v3/index/mitre-cvelist-v5', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -189134,7 +189134,7 @@ def _index_mongodb_get_serialize( @validate_call - def index_moxa_get( + def index_mitsubishi_electric_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -189172,10 +189172,10 @@ def index_moxa_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMoxaAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"moxa\" + ) -> RenderResponseWithMetadataArrayAdvisoryMitsubishiElectricAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"mitsubishi-electric\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the moxa index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Moxa Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/moxa?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/moxa?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitsubishi-electric index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mitsubishi Electric Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitsubishi-electric?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitsubishi-electric?cursor=` :param page: set the page number of the response :type page: int @@ -189247,7 +189247,7 @@ def index_moxa_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_moxa_get_serialize( + _param = self._index_mitsubishi_electric_get_serialize( page=page, limit=limit, cursor=cursor, @@ -189279,7 +189279,7 @@ def index_moxa_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMoxaAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMitsubishiElectricAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -189295,7 +189295,7 @@ def index_moxa_get( @validate_call - def index_moxa_get_with_http_info( + def index_mitsubishi_electric_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -189333,10 +189333,10 @@ def index_moxa_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMoxaAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"moxa\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMitsubishiElectricAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"mitsubishi-electric\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the moxa index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Moxa Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/moxa?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/moxa?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitsubishi-electric index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mitsubishi Electric Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitsubishi-electric?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitsubishi-electric?cursor=` :param page: set the page number of the response :type page: int @@ -189408,7 +189408,7 @@ def index_moxa_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_moxa_get_serialize( + _param = self._index_mitsubishi_electric_get_serialize( page=page, limit=limit, cursor=cursor, @@ -189440,7 +189440,7 @@ def index_moxa_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMoxaAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMitsubishiElectricAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -189456,7 +189456,7 @@ def index_moxa_get_with_http_info( @validate_call - def index_moxa_get_without_preload_content( + def index_mitsubishi_electric_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -189495,9 +189495,9 @@ def index_moxa_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"moxa\" + """Return vulnerability data stored in index \"mitsubishi-electric\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the moxa index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Moxa Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/moxa?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/moxa?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mitsubishi-electric index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mitsubishi Electric Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mitsubishi-electric?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mitsubishi-electric?cursor=` :param page: set the page number of the response :type page: int @@ -189569,7 +189569,7 @@ def index_moxa_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_moxa_get_serialize( + _param = self._index_mitsubishi_electric_get_serialize( page=page, limit=limit, cursor=cursor, @@ -189601,7 +189601,7 @@ def index_moxa_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMoxaAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMitsubishiElectricAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -189612,7 +189612,7 @@ def index_moxa_get_without_preload_content( return response_data.response - def _index_moxa_get_serialize( + def _index_mitsubishi_electric_get_serialize( self, page, limit, @@ -189780,7 +189780,7 @@ def _index_moxa_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/moxa', + resource_path='/v3/index/mitsubishi-electric', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -189797,7 +189797,7 @@ def _index_moxa_get_serialize( @validate_call - def index_mozilla_get( + def index_mongodb_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -189835,10 +189835,10 @@ def index_mozilla_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMozillaAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"mozilla\" + ) -> RenderResponseWithMetadataArrayAdvisoryMongoDBPaginatePagination: + """Return vulnerability data stored in index \"mongodb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mozilla index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mozilla Foundation Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mozilla?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mozilla?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mongodb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MongoDB Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mongodb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mongodb?cursor=` :param page: set the page number of the response :type page: int @@ -189910,7 +189910,7 @@ def index_mozilla_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mozilla_get_serialize( + _param = self._index_mongodb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -189942,7 +189942,7 @@ def index_mozilla_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMozillaAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMongoDBPaginatePagination", '404': "str", '500': "str", } @@ -189958,7 +189958,7 @@ def index_mozilla_get( @validate_call - def index_mozilla_get_with_http_info( + def index_mongodb_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -189996,10 +189996,10 @@ def index_mozilla_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMozillaAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"mozilla\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMongoDBPaginatePagination]: + """Return vulnerability data stored in index \"mongodb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mozilla index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mozilla Foundation Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mozilla?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mozilla?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mongodb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MongoDB Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mongodb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mongodb?cursor=` :param page: set the page number of the response :type page: int @@ -190071,7 +190071,7 @@ def index_mozilla_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mozilla_get_serialize( + _param = self._index_mongodb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -190103,7 +190103,7 @@ def index_mozilla_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMozillaAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMongoDBPaginatePagination", '404': "str", '500': "str", } @@ -190119,7 +190119,7 @@ def index_mozilla_get_with_http_info( @validate_call - def index_mozilla_get_without_preload_content( + def index_mongodb_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -190158,9 +190158,9 @@ def index_mozilla_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"mozilla\" + """Return vulnerability data stored in index \"mongodb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mozilla index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mozilla Foundation Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mozilla?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mozilla?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mongodb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** MongoDB Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mongodb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mongodb?cursor=` :param page: set the page number of the response :type page: int @@ -190232,7 +190232,7 @@ def index_mozilla_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_mozilla_get_serialize( + _param = self._index_mongodb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -190264,7 +190264,7 @@ def index_mozilla_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMozillaAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMongoDBPaginatePagination", '404': "str", '500': "str", } @@ -190275,7 +190275,7 @@ def index_mozilla_get_without_preload_content( return response_data.response - def _index_mozilla_get_serialize( + def _index_mongodb_get_serialize( self, page, limit, @@ -190443,7 +190443,7 @@ def _index_mozilla_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/mozilla', + resource_path='/v3/index/mongodb', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -190460,7 +190460,7 @@ def _index_mozilla_get_serialize( @validate_call - def index_naver_get( + def index_moxa_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -190498,10 +190498,10 @@ def index_naver_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNaverPaginatePagination: - """Return vulnerability data stored in index \"naver\" + ) -> RenderResponseWithMetadataArrayAdvisoryMoxaAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"moxa\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the naver index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Naver Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/naver?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/naver?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the moxa index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Moxa Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/moxa?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/moxa?cursor=` :param page: set the page number of the response :type page: int @@ -190573,7 +190573,7 @@ def index_naver_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_naver_get_serialize( + _param = self._index_moxa_get_serialize( page=page, limit=limit, cursor=cursor, @@ -190605,7 +190605,7 @@ def index_naver_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNaverPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMoxaAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -190621,7 +190621,7 @@ def index_naver_get( @validate_call - def index_naver_get_with_http_info( + def index_moxa_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -190659,10 +190659,10 @@ def index_naver_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNaverPaginatePagination]: - """Return vulnerability data stored in index \"naver\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMoxaAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"moxa\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the naver index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Naver Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/naver?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/naver?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the moxa index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Moxa Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/moxa?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/moxa?cursor=` :param page: set the page number of the response :type page: int @@ -190734,7 +190734,7 @@ def index_naver_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_naver_get_serialize( + _param = self._index_moxa_get_serialize( page=page, limit=limit, cursor=cursor, @@ -190766,7 +190766,7 @@ def index_naver_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNaverPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMoxaAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -190782,7 +190782,7 @@ def index_naver_get_with_http_info( @validate_call - def index_naver_get_without_preload_content( + def index_moxa_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -190821,9 +190821,9 @@ def index_naver_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"naver\" + """Return vulnerability data stored in index \"moxa\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the naver index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Naver Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/naver?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/naver?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the moxa index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Moxa Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/moxa?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/moxa?cursor=` :param page: set the page number of the response :type page: int @@ -190895,7 +190895,7 @@ def index_naver_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_naver_get_serialize( + _param = self._index_moxa_get_serialize( page=page, limit=limit, cursor=cursor, @@ -190927,7 +190927,7 @@ def index_naver_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNaverPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMoxaAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -190938,7 +190938,7 @@ def index_naver_get_without_preload_content( return response_data.response - def _index_naver_get_serialize( + def _index_moxa_get_serialize( self, page, limit, @@ -191106,7 +191106,7 @@ def _index_naver_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/naver', + resource_path='/v3/index/moxa', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -191123,7 +191123,7 @@ def _index_naver_get_serialize( @validate_call - def index_ncsc_cves_get( + def index_mozilla_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -191161,10 +191161,10 @@ def index_ncsc_cves_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNCSCCVEPaginatePagination: - """Return vulnerability data stored in index \"ncsc-cves\" + ) -> RenderResponseWithMetadataArrayAdvisoryMozillaAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"mozilla\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ncsc-cves index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NCSC CVEs ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc-cves?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ncsc-cves?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mozilla index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mozilla Foundation Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mozilla?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mozilla?cursor=` :param page: set the page number of the response :type page: int @@ -191236,7 +191236,7 @@ def index_ncsc_cves_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ncsc_cves_get_serialize( + _param = self._index_mozilla_get_serialize( page=page, limit=limit, cursor=cursor, @@ -191268,7 +191268,7 @@ def index_ncsc_cves_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNCSCCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMozillaAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -191284,7 +191284,7 @@ def index_ncsc_cves_get( @validate_call - def index_ncsc_cves_get_with_http_info( + def index_mozilla_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -191322,10 +191322,10 @@ def index_ncsc_cves_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNCSCCVEPaginatePagination]: - """Return vulnerability data stored in index \"ncsc-cves\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMozillaAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"mozilla\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ncsc-cves index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NCSC CVEs ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc-cves?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ncsc-cves?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mozilla index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mozilla Foundation Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mozilla?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mozilla?cursor=` :param page: set the page number of the response :type page: int @@ -191397,7 +191397,7 @@ def index_ncsc_cves_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ncsc_cves_get_serialize( + _param = self._index_mozilla_get_serialize( page=page, limit=limit, cursor=cursor, @@ -191429,7 +191429,7 @@ def index_ncsc_cves_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNCSCCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMozillaAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -191445,7 +191445,7 @@ def index_ncsc_cves_get_with_http_info( @validate_call - def index_ncsc_cves_get_without_preload_content( + def index_mozilla_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -191484,9 +191484,9 @@ def index_ncsc_cves_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ncsc-cves\" + """Return vulnerability data stored in index \"mozilla\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ncsc-cves index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NCSC CVEs ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc-cves?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ncsc-cves?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the mozilla index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Mozilla Foundation Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/mozilla?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/mozilla?cursor=` :param page: set the page number of the response :type page: int @@ -191558,7 +191558,7 @@ def index_ncsc_cves_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ncsc_cves_get_serialize( + _param = self._index_mozilla_get_serialize( page=page, limit=limit, cursor=cursor, @@ -191590,7 +191590,7 @@ def index_ncsc_cves_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNCSCCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMozillaAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -191601,7 +191601,7 @@ def index_ncsc_cves_get_without_preload_content( return response_data.response - def _index_ncsc_cves_get_serialize( + def _index_mozilla_get_serialize( self, page, limit, @@ -191769,7 +191769,7 @@ def _index_ncsc_cves_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ncsc-cves', + resource_path='/v3/index/mozilla', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -191786,7 +191786,7 @@ def _index_ncsc_cves_get_serialize( @validate_call - def index_ncsc_get( + def index_naver_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -191824,10 +191824,10 @@ def index_ncsc_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNCSCPaginatePagination: - """Return vulnerability data stored in index \"ncsc\" + ) -> RenderResponseWithMetadataArrayAdvisoryNaverPaginatePagination: + """Return vulnerability data stored in index \"naver\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ncsc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NCSC Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ncsc?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the naver index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Naver Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/naver?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/naver?cursor=` :param page: set the page number of the response :type page: int @@ -191899,7 +191899,7 @@ def index_ncsc_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ncsc_get_serialize( + _param = self._index_naver_get_serialize( page=page, limit=limit, cursor=cursor, @@ -191931,7 +191931,7 @@ def index_ncsc_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNCSCPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNaverPaginatePagination", '404': "str", '500': "str", } @@ -191947,7 +191947,7 @@ def index_ncsc_get( @validate_call - def index_ncsc_get_with_http_info( + def index_naver_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -191985,10 +191985,10 @@ def index_ncsc_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNCSCPaginatePagination]: - """Return vulnerability data stored in index \"ncsc\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNaverPaginatePagination]: + """Return vulnerability data stored in index \"naver\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ncsc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NCSC Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ncsc?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the naver index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Naver Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/naver?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/naver?cursor=` :param page: set the page number of the response :type page: int @@ -192060,7 +192060,7 @@ def index_ncsc_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ncsc_get_serialize( + _param = self._index_naver_get_serialize( page=page, limit=limit, cursor=cursor, @@ -192092,7 +192092,7 @@ def index_ncsc_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNCSCPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNaverPaginatePagination", '404': "str", '500': "str", } @@ -192108,7 +192108,7 @@ def index_ncsc_get_with_http_info( @validate_call - def index_ncsc_get_without_preload_content( + def index_naver_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -192147,9 +192147,9 @@ def index_ncsc_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ncsc\" + """Return vulnerability data stored in index \"naver\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ncsc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NCSC Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ncsc?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the naver index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Naver Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/naver?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/naver?cursor=` :param page: set the page number of the response :type page: int @@ -192221,7 +192221,7 @@ def index_ncsc_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ncsc_get_serialize( + _param = self._index_naver_get_serialize( page=page, limit=limit, cursor=cursor, @@ -192253,7 +192253,7 @@ def index_ncsc_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNCSCPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNaverPaginatePagination", '404': "str", '500': "str", } @@ -192264,7 +192264,7 @@ def index_ncsc_get_without_preload_content( return response_data.response - def _index_ncsc_get_serialize( + def _index_naver_get_serialize( self, page, limit, @@ -192432,7 +192432,7 @@ def _index_ncsc_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ncsc', + resource_path='/v3/index/naver', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -192449,7 +192449,7 @@ def _index_ncsc_get_serialize( @validate_call - def index_nec_get( + def index_ncsc_cves_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -192487,10 +192487,10 @@ def index_nec_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNECPaginatePagination: - """Return vulnerability data stored in index \"nec\" + ) -> RenderResponseWithMetadataArrayAdvisoryNCSCCVEPaginatePagination: + """Return vulnerability data stored in index \"ncsc-cves\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nec index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NEC Security Information Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nec?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nec?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ncsc-cves index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NCSC CVEs ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc-cves?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ncsc-cves?cursor=` :param page: set the page number of the response :type page: int @@ -192562,7 +192562,7 @@ def index_nec_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nec_get_serialize( + _param = self._index_ncsc_cves_get_serialize( page=page, limit=limit, cursor=cursor, @@ -192594,7 +192594,7 @@ def index_nec_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNECPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNCSCCVEPaginatePagination", '404': "str", '500': "str", } @@ -192610,7 +192610,7 @@ def index_nec_get( @validate_call - def index_nec_get_with_http_info( + def index_ncsc_cves_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -192648,10 +192648,10 @@ def index_nec_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNECPaginatePagination]: - """Return vulnerability data stored in index \"nec\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNCSCCVEPaginatePagination]: + """Return vulnerability data stored in index \"ncsc-cves\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nec index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NEC Security Information Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nec?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nec?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ncsc-cves index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NCSC CVEs ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc-cves?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ncsc-cves?cursor=` :param page: set the page number of the response :type page: int @@ -192723,7 +192723,7 @@ def index_nec_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nec_get_serialize( + _param = self._index_ncsc_cves_get_serialize( page=page, limit=limit, cursor=cursor, @@ -192755,7 +192755,7 @@ def index_nec_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNECPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNCSCCVEPaginatePagination", '404': "str", '500': "str", } @@ -192771,7 +192771,7 @@ def index_nec_get_with_http_info( @validate_call - def index_nec_get_without_preload_content( + def index_ncsc_cves_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -192810,9 +192810,9 @@ def index_nec_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"nec\" + """Return vulnerability data stored in index \"ncsc-cves\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nec index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NEC Security Information Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nec?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nec?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ncsc-cves index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NCSC CVEs ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc-cves?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ncsc-cves?cursor=` :param page: set the page number of the response :type page: int @@ -192884,7 +192884,7 @@ def index_nec_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nec_get_serialize( + _param = self._index_ncsc_cves_get_serialize( page=page, limit=limit, cursor=cursor, @@ -192916,7 +192916,7 @@ def index_nec_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNECPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNCSCCVEPaginatePagination", '404': "str", '500': "str", } @@ -192927,7 +192927,7 @@ def index_nec_get_without_preload_content( return response_data.response - def _index_nec_get_serialize( + def _index_ncsc_cves_get_serialize( self, page, limit, @@ -193095,7 +193095,7 @@ def _index_nec_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/nec', + resource_path='/v3/index/ncsc-cves', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -193112,7 +193112,7 @@ def _index_nec_get_serialize( @validate_call - def index_nessus_get( + def index_ncsc_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -193150,10 +193150,10 @@ def index_nessus_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNessusPaginatePagination: - """Return vulnerability data stored in index \"nessus\" + ) -> RenderResponseWithMetadataArrayAdvisoryNCSCPaginatePagination: + """Return vulnerability data stored in index \"ncsc\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nessus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nessus Plugins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nessus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nessus?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ncsc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NCSC Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ncsc?cursor=` :param page: set the page number of the response :type page: int @@ -193225,7 +193225,7 @@ def index_nessus_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nessus_get_serialize( + _param = self._index_ncsc_get_serialize( page=page, limit=limit, cursor=cursor, @@ -193257,7 +193257,7 @@ def index_nessus_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNessusPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNCSCPaginatePagination", '404': "str", '500': "str", } @@ -193273,7 +193273,7 @@ def index_nessus_get( @validate_call - def index_nessus_get_with_http_info( + def index_ncsc_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -193311,10 +193311,10 @@ def index_nessus_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNessusPaginatePagination]: - """Return vulnerability data stored in index \"nessus\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNCSCPaginatePagination]: + """Return vulnerability data stored in index \"ncsc\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nessus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nessus Plugins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nessus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nessus?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ncsc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NCSC Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ncsc?cursor=` :param page: set the page number of the response :type page: int @@ -193386,7 +193386,7 @@ def index_nessus_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nessus_get_serialize( + _param = self._index_ncsc_get_serialize( page=page, limit=limit, cursor=cursor, @@ -193418,7 +193418,7 @@ def index_nessus_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNessusPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNCSCPaginatePagination", '404': "str", '500': "str", } @@ -193434,7 +193434,7 @@ def index_nessus_get_with_http_info( @validate_call - def index_nessus_get_without_preload_content( + def index_ncsc_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -193473,9 +193473,9 @@ def index_nessus_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"nessus\" + """Return vulnerability data stored in index \"ncsc\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nessus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nessus Plugins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nessus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nessus?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ncsc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NCSC Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ncsc?cursor=` :param page: set the page number of the response :type page: int @@ -193547,7 +193547,7 @@ def index_nessus_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nessus_get_serialize( + _param = self._index_ncsc_get_serialize( page=page, limit=limit, cursor=cursor, @@ -193579,7 +193579,7 @@ def index_nessus_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNessusPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNCSCPaginatePagination", '404': "str", '500': "str", } @@ -193590,7 +193590,7 @@ def index_nessus_get_without_preload_content( return response_data.response - def _index_nessus_get_serialize( + def _index_ncsc_get_serialize( self, page, limit, @@ -193758,7 +193758,7 @@ def _index_nessus_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/nessus', + resource_path='/v3/index/ncsc', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -193775,7 +193775,7 @@ def _index_nessus_get_serialize( @validate_call - def index_netapp_get( + def index_nec_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -193813,10 +193813,10 @@ def index_netapp_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNetAppPaginatePagination: - """Return vulnerability data stored in index \"netapp\" + ) -> RenderResponseWithMetadataArrayAdvisoryNECPaginatePagination: + """Return vulnerability data stored in index \"nec\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netapp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NetApp Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netapp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netapp?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nec index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NEC Security Information Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nec?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nec?cursor=` :param page: set the page number of the response :type page: int @@ -193888,7 +193888,7 @@ def index_netapp_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_netapp_get_serialize( + _param = self._index_nec_get_serialize( page=page, limit=limit, cursor=cursor, @@ -193920,7 +193920,7 @@ def index_netapp_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNetAppPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNECPaginatePagination", '404': "str", '500': "str", } @@ -193936,7 +193936,7 @@ def index_netapp_get( @validate_call - def index_netapp_get_with_http_info( + def index_nec_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -193974,10 +193974,10 @@ def index_netapp_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNetAppPaginatePagination]: - """Return vulnerability data stored in index \"netapp\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNECPaginatePagination]: + """Return vulnerability data stored in index \"nec\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netapp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NetApp Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netapp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netapp?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nec index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NEC Security Information Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nec?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nec?cursor=` :param page: set the page number of the response :type page: int @@ -194049,7 +194049,7 @@ def index_netapp_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_netapp_get_serialize( + _param = self._index_nec_get_serialize( page=page, limit=limit, cursor=cursor, @@ -194081,7 +194081,7 @@ def index_netapp_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNetAppPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNECPaginatePagination", '404': "str", '500': "str", } @@ -194097,7 +194097,7 @@ def index_netapp_get_with_http_info( @validate_call - def index_netapp_get_without_preload_content( + def index_nec_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -194136,9 +194136,9 @@ def index_netapp_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"netapp\" + """Return vulnerability data stored in index \"nec\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netapp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NetApp Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netapp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netapp?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nec index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NEC Security Information Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nec?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nec?cursor=` :param page: set the page number of the response :type page: int @@ -194210,7 +194210,7 @@ def index_netapp_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_netapp_get_serialize( + _param = self._index_nec_get_serialize( page=page, limit=limit, cursor=cursor, @@ -194242,7 +194242,7 @@ def index_netapp_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNetAppPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNECPaginatePagination", '404': "str", '500': "str", } @@ -194253,7 +194253,7 @@ def index_netapp_get_without_preload_content( return response_data.response - def _index_netapp_get_serialize( + def _index_nec_get_serialize( self, page, limit, @@ -194421,7 +194421,7 @@ def _index_netapp_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/netapp', + resource_path='/v3/index/nec', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -194438,7 +194438,7 @@ def _index_netapp_get_serialize( @validate_call - def index_netatalk_get( + def index_nessus_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -194476,10 +194476,10 @@ def index_netatalk_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNetatalkPaginatePagination: - """Return vulnerability data stored in index \"netatalk\" + ) -> RenderResponseWithMetadataArrayAdvisoryNessusPaginatePagination: + """Return vulnerability data stored in index \"nessus\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netatalk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netatalk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netatalk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netatalk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nessus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nessus Plugins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nessus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nessus?cursor=` :param page: set the page number of the response :type page: int @@ -194551,7 +194551,7 @@ def index_netatalk_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_netatalk_get_serialize( + _param = self._index_nessus_get_serialize( page=page, limit=limit, cursor=cursor, @@ -194583,7 +194583,7 @@ def index_netatalk_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNetatalkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNessusPaginatePagination", '404': "str", '500': "str", } @@ -194599,7 +194599,7 @@ def index_netatalk_get( @validate_call - def index_netatalk_get_with_http_info( + def index_nessus_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -194637,10 +194637,10 @@ def index_netatalk_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNetatalkPaginatePagination]: - """Return vulnerability data stored in index \"netatalk\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNessusPaginatePagination]: + """Return vulnerability data stored in index \"nessus\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netatalk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netatalk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netatalk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netatalk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nessus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nessus Plugins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nessus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nessus?cursor=` :param page: set the page number of the response :type page: int @@ -194712,7 +194712,7 @@ def index_netatalk_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_netatalk_get_serialize( + _param = self._index_nessus_get_serialize( page=page, limit=limit, cursor=cursor, @@ -194744,7 +194744,7 @@ def index_netatalk_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNetatalkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNessusPaginatePagination", '404': "str", '500': "str", } @@ -194760,7 +194760,7 @@ def index_netatalk_get_with_http_info( @validate_call - def index_netatalk_get_without_preload_content( + def index_nessus_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -194799,9 +194799,9 @@ def index_netatalk_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"netatalk\" + """Return vulnerability data stored in index \"nessus\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netatalk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netatalk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netatalk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netatalk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nessus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nessus Plugins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nessus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nessus?cursor=` :param page: set the page number of the response :type page: int @@ -194873,7 +194873,7 @@ def index_netatalk_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_netatalk_get_serialize( + _param = self._index_nessus_get_serialize( page=page, limit=limit, cursor=cursor, @@ -194905,7 +194905,7 @@ def index_netatalk_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNetatalkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNessusPaginatePagination", '404': "str", '500': "str", } @@ -194916,7 +194916,7 @@ def index_netatalk_get_without_preload_content( return response_data.response - def _index_netatalk_get_serialize( + def _index_nessus_get_serialize( self, page, limit, @@ -195084,7 +195084,7 @@ def _index_netatalk_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/netatalk', + resource_path='/v3/index/nessus', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -195101,7 +195101,7 @@ def _index_netatalk_get_serialize( @validate_call - def index_netgate_get( + def index_netapp_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -195139,10 +195139,10 @@ def index_netgate_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNetgatePaginatePagination: - """Return vulnerability data stored in index \"netgate\" + ) -> RenderResponseWithMetadataArrayAdvisoryNetAppPaginatePagination: + """Return vulnerability data stored in index \"netapp\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netgate index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netgate Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netgate?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netgate?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netapp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NetApp Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netapp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netapp?cursor=` :param page: set the page number of the response :type page: int @@ -195214,7 +195214,7 @@ def index_netgate_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_netgate_get_serialize( + _param = self._index_netapp_get_serialize( page=page, limit=limit, cursor=cursor, @@ -195246,7 +195246,7 @@ def index_netgate_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNetgatePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNetAppPaginatePagination", '404': "str", '500': "str", } @@ -195262,7 +195262,7 @@ def index_netgate_get( @validate_call - def index_netgate_get_with_http_info( + def index_netapp_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -195300,10 +195300,10 @@ def index_netgate_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNetgatePaginatePagination]: - """Return vulnerability data stored in index \"netgate\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNetAppPaginatePagination]: + """Return vulnerability data stored in index \"netapp\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netgate index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netgate Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netgate?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netgate?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netapp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NetApp Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netapp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netapp?cursor=` :param page: set the page number of the response :type page: int @@ -195375,7 +195375,7 @@ def index_netgate_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_netgate_get_serialize( + _param = self._index_netapp_get_serialize( page=page, limit=limit, cursor=cursor, @@ -195407,7 +195407,7 @@ def index_netgate_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNetgatePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNetAppPaginatePagination", '404': "str", '500': "str", } @@ -195423,7 +195423,7 @@ def index_netgate_get_with_http_info( @validate_call - def index_netgate_get_without_preload_content( + def index_netapp_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -195462,9 +195462,9 @@ def index_netgate_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"netgate\" + """Return vulnerability data stored in index \"netapp\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netgate index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netgate Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netgate?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netgate?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netapp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NetApp Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netapp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netapp?cursor=` :param page: set the page number of the response :type page: int @@ -195536,7 +195536,7 @@ def index_netgate_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_netgate_get_serialize( + _param = self._index_netapp_get_serialize( page=page, limit=limit, cursor=cursor, @@ -195568,7 +195568,7 @@ def index_netgate_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNetgatePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNetAppPaginatePagination", '404': "str", '500': "str", } @@ -195579,7 +195579,7 @@ def index_netgate_get_without_preload_content( return response_data.response - def _index_netgate_get_serialize( + def _index_netapp_get_serialize( self, page, limit, @@ -195747,7 +195747,7 @@ def _index_netgate_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/netgate', + resource_path='/v3/index/netapp', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -195764,7 +195764,7 @@ def _index_netgate_get_serialize( @validate_call - def index_netgear_get( + def index_netatalk_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -195802,10 +195802,10 @@ def index_netgear_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNetgearPaginatePagination: - """Return vulnerability data stored in index \"netgear\" + ) -> RenderResponseWithMetadataArrayAdvisoryNetatalkPaginatePagination: + """Return vulnerability data stored in index \"netatalk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netgear index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NETGEAR Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netgear?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netgear?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netatalk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netatalk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netatalk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netatalk?cursor=` :param page: set the page number of the response :type page: int @@ -195877,7 +195877,7 @@ def index_netgear_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_netgear_get_serialize( + _param = self._index_netatalk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -195909,7 +195909,7 @@ def index_netgear_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNetgearPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNetatalkPaginatePagination", '404': "str", '500': "str", } @@ -195925,7 +195925,7 @@ def index_netgear_get( @validate_call - def index_netgear_get_with_http_info( + def index_netatalk_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -195963,10 +195963,10 @@ def index_netgear_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNetgearPaginatePagination]: - """Return vulnerability data stored in index \"netgear\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNetatalkPaginatePagination]: + """Return vulnerability data stored in index \"netatalk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netgear index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NETGEAR Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netgear?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netgear?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netatalk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netatalk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netatalk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netatalk?cursor=` :param page: set the page number of the response :type page: int @@ -196038,7 +196038,7 @@ def index_netgear_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_netgear_get_serialize( + _param = self._index_netatalk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -196070,7 +196070,7 @@ def index_netgear_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNetgearPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNetatalkPaginatePagination", '404': "str", '500': "str", } @@ -196086,7 +196086,7 @@ def index_netgear_get_with_http_info( @validate_call - def index_netgear_get_without_preload_content( + def index_netatalk_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -196125,9 +196125,9 @@ def index_netgear_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"netgear\" + """Return vulnerability data stored in index \"netatalk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netgear index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NETGEAR Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netgear?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netgear?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netatalk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netatalk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netatalk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netatalk?cursor=` :param page: set the page number of the response :type page: int @@ -196199,7 +196199,7 @@ def index_netgear_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_netgear_get_serialize( + _param = self._index_netatalk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -196231,7 +196231,7 @@ def index_netgear_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNetgearPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNetatalkPaginatePagination", '404': "str", '500': "str", } @@ -196242,7 +196242,7 @@ def index_netgear_get_without_preload_content( return response_data.response - def _index_netgear_get_serialize( + def _index_netatalk_get_serialize( self, page, limit, @@ -196410,7 +196410,7 @@ def _index_netgear_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/netgear', + resource_path='/v3/index/netatalk', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -196427,7 +196427,7 @@ def _index_netgear_get_serialize( @validate_call - def index_netskope_get( + def index_netgate_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -196465,10 +196465,10 @@ def index_netskope_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNetskopePaginatePagination: - """Return vulnerability data stored in index \"netskope\" + ) -> RenderResponseWithMetadataArrayAdvisoryNetgatePaginatePagination: + """Return vulnerability data stored in index \"netgate\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netskope index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netskope Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netskope?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netskope?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netgate index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netgate Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netgate?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netgate?cursor=` :param page: set the page number of the response :type page: int @@ -196540,7 +196540,7 @@ def index_netskope_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_netskope_get_serialize( + _param = self._index_netgate_get_serialize( page=page, limit=limit, cursor=cursor, @@ -196572,7 +196572,7 @@ def index_netskope_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNetskopePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNetgatePaginatePagination", '404': "str", '500': "str", } @@ -196588,7 +196588,7 @@ def index_netskope_get( @validate_call - def index_netskope_get_with_http_info( + def index_netgate_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -196626,10 +196626,10 @@ def index_netskope_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNetskopePaginatePagination]: - """Return vulnerability data stored in index \"netskope\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNetgatePaginatePagination]: + """Return vulnerability data stored in index \"netgate\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netskope index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netskope Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netskope?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netskope?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netgate index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netgate Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netgate?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netgate?cursor=` :param page: set the page number of the response :type page: int @@ -196701,7 +196701,7 @@ def index_netskope_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_netskope_get_serialize( + _param = self._index_netgate_get_serialize( page=page, limit=limit, cursor=cursor, @@ -196733,7 +196733,7 @@ def index_netskope_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNetskopePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNetgatePaginatePagination", '404': "str", '500': "str", } @@ -196749,7 +196749,7 @@ def index_netskope_get_with_http_info( @validate_call - def index_netskope_get_without_preload_content( + def index_netgate_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -196788,9 +196788,9 @@ def index_netskope_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"netskope\" + """Return vulnerability data stored in index \"netgate\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netskope index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netskope Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netskope?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netskope?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netgate index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netgate Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netgate?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netgate?cursor=` :param page: set the page number of the response :type page: int @@ -196862,7 +196862,7 @@ def index_netskope_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_netskope_get_serialize( + _param = self._index_netgate_get_serialize( page=page, limit=limit, cursor=cursor, @@ -196894,7 +196894,7 @@ def index_netskope_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNetskopePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNetgatePaginatePagination", '404': "str", '500': "str", } @@ -196905,7 +196905,7 @@ def index_netskope_get_without_preload_content( return response_data.response - def _index_netskope_get_serialize( + def _index_netgate_get_serialize( self, page, limit, @@ -197073,7 +197073,7 @@ def _index_netskope_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/netskope', + resource_path='/v3/index/netgate', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -197090,7 +197090,7 @@ def _index_netskope_get_serialize( @validate_call - def index_nexpose_get( + def index_netgear_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -197128,10 +197128,10 @@ def index_nexpose_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNexposePaginatePagination: - """Return vulnerability data stored in index \"nexpose\" + ) -> RenderResponseWithMetadataArrayAdvisoryNetgearPaginatePagination: + """Return vulnerability data stored in index \"netgear\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nexpose index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nexpose Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nexpose?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nexpose?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netgear index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NETGEAR Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netgear?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netgear?cursor=` :param page: set the page number of the response :type page: int @@ -197203,7 +197203,7 @@ def index_nexpose_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nexpose_get_serialize( + _param = self._index_netgear_get_serialize( page=page, limit=limit, cursor=cursor, @@ -197235,7 +197235,7 @@ def index_nexpose_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNexposePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNetgearPaginatePagination", '404': "str", '500': "str", } @@ -197251,7 +197251,7 @@ def index_nexpose_get( @validate_call - def index_nexpose_get_with_http_info( + def index_netgear_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -197289,10 +197289,10 @@ def index_nexpose_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNexposePaginatePagination]: - """Return vulnerability data stored in index \"nexpose\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNetgearPaginatePagination]: + """Return vulnerability data stored in index \"netgear\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nexpose index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nexpose Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nexpose?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nexpose?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netgear index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NETGEAR Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netgear?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netgear?cursor=` :param page: set the page number of the response :type page: int @@ -197364,7 +197364,7 @@ def index_nexpose_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nexpose_get_serialize( + _param = self._index_netgear_get_serialize( page=page, limit=limit, cursor=cursor, @@ -197396,7 +197396,7 @@ def index_nexpose_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNexposePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNetgearPaginatePagination", '404': "str", '500': "str", } @@ -197412,7 +197412,7 @@ def index_nexpose_get_with_http_info( @validate_call - def index_nexpose_get_without_preload_content( + def index_netgear_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -197451,9 +197451,9 @@ def index_nexpose_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"nexpose\" + """Return vulnerability data stored in index \"netgear\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nexpose index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nexpose Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nexpose?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nexpose?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netgear index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NETGEAR Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netgear?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netgear?cursor=` :param page: set the page number of the response :type page: int @@ -197525,7 +197525,7 @@ def index_nexpose_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nexpose_get_serialize( + _param = self._index_netgear_get_serialize( page=page, limit=limit, cursor=cursor, @@ -197557,7 +197557,7 @@ def index_nexpose_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNexposePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNetgearPaginatePagination", '404': "str", '500': "str", } @@ -197568,7 +197568,7 @@ def index_nexpose_get_without_preload_content( return response_data.response - def _index_nexpose_get_serialize( + def _index_netgear_get_serialize( self, page, limit, @@ -197736,7 +197736,7 @@ def _index_nexpose_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/nexpose', + resource_path='/v3/index/netgear', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -197753,7 +197753,7 @@ def _index_nexpose_get_serialize( @validate_call - def index_nginx_get( + def index_netskope_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -197791,10 +197791,10 @@ def index_nginx_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNginxAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"nginx\" + ) -> RenderResponseWithMetadataArrayAdvisoryNetskopePaginatePagination: + """Return vulnerability data stored in index \"netskope\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nginx index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nginx Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nginx?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nginx?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netskope index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netskope Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netskope?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netskope?cursor=` :param page: set the page number of the response :type page: int @@ -197866,7 +197866,7 @@ def index_nginx_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nginx_get_serialize( + _param = self._index_netskope_get_serialize( page=page, limit=limit, cursor=cursor, @@ -197898,7 +197898,7 @@ def index_nginx_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNginxAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNetskopePaginatePagination", '404': "str", '500': "str", } @@ -197914,7 +197914,7 @@ def index_nginx_get( @validate_call - def index_nginx_get_with_http_info( + def index_netskope_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -197952,10 +197952,10 @@ def index_nginx_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNginxAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"nginx\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNetskopePaginatePagination]: + """Return vulnerability data stored in index \"netskope\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nginx index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nginx Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nginx?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nginx?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netskope index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netskope Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netskope?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netskope?cursor=` :param page: set the page number of the response :type page: int @@ -198027,7 +198027,7 @@ def index_nginx_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nginx_get_serialize( + _param = self._index_netskope_get_serialize( page=page, limit=limit, cursor=cursor, @@ -198059,7 +198059,7 @@ def index_nginx_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNginxAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNetskopePaginatePagination", '404': "str", '500': "str", } @@ -198075,7 +198075,7 @@ def index_nginx_get_with_http_info( @validate_call - def index_nginx_get_without_preload_content( + def index_netskope_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -198114,9 +198114,9 @@ def index_nginx_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"nginx\" + """Return vulnerability data stored in index \"netskope\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nginx index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nginx Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nginx?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nginx?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the netskope index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Netskope Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/netskope?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/netskope?cursor=` :param page: set the page number of the response :type page: int @@ -198188,7 +198188,7 @@ def index_nginx_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nginx_get_serialize( + _param = self._index_netskope_get_serialize( page=page, limit=limit, cursor=cursor, @@ -198220,7 +198220,7 @@ def index_nginx_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNginxAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNetskopePaginatePagination", '404': "str", '500': "str", } @@ -198231,7 +198231,7 @@ def index_nginx_get_without_preload_content( return response_data.response - def _index_nginx_get_serialize( + def _index_netskope_get_serialize( self, page, limit, @@ -198399,7 +198399,7 @@ def _index_nginx_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/nginx', + resource_path='/v3/index/netskope', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -198416,7 +198416,7 @@ def _index_nginx_get_serialize( @validate_call - def index_nhs_get( + def index_nexpose_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -198454,10 +198454,10 @@ def index_nhs_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNHSPaginatePagination: - """Return vulnerability data stored in index \"nhs\" + ) -> RenderResponseWithMetadataArrayAdvisoryNexposePaginatePagination: + """Return vulnerability data stored in index \"nexpose\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nhs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NHS Cyber Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nhs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nhs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nexpose index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nexpose Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nexpose?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nexpose?cursor=` :param page: set the page number of the response :type page: int @@ -198529,7 +198529,7 @@ def index_nhs_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nhs_get_serialize( + _param = self._index_nexpose_get_serialize( page=page, limit=limit, cursor=cursor, @@ -198561,7 +198561,7 @@ def index_nhs_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNHSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNexposePaginatePagination", '404': "str", '500': "str", } @@ -198577,7 +198577,7 @@ def index_nhs_get( @validate_call - def index_nhs_get_with_http_info( + def index_nexpose_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -198615,10 +198615,10 @@ def index_nhs_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNHSPaginatePagination]: - """Return vulnerability data stored in index \"nhs\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNexposePaginatePagination]: + """Return vulnerability data stored in index \"nexpose\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nhs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NHS Cyber Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nhs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nhs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nexpose index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nexpose Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nexpose?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nexpose?cursor=` :param page: set the page number of the response :type page: int @@ -198690,7 +198690,7 @@ def index_nhs_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nhs_get_serialize( + _param = self._index_nexpose_get_serialize( page=page, limit=limit, cursor=cursor, @@ -198722,7 +198722,7 @@ def index_nhs_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNHSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNexposePaginatePagination", '404': "str", '500': "str", } @@ -198738,7 +198738,7 @@ def index_nhs_get_with_http_info( @validate_call - def index_nhs_get_without_preload_content( + def index_nexpose_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -198777,9 +198777,9 @@ def index_nhs_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"nhs\" + """Return vulnerability data stored in index \"nexpose\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nhs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NHS Cyber Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nhs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nhs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nexpose index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nexpose Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nexpose?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nexpose?cursor=` :param page: set the page number of the response :type page: int @@ -198851,7 +198851,7 @@ def index_nhs_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nhs_get_serialize( + _param = self._index_nexpose_get_serialize( page=page, limit=limit, cursor=cursor, @@ -198883,7 +198883,7 @@ def index_nhs_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNHSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNexposePaginatePagination", '404': "str", '500': "str", } @@ -198894,7 +198894,7 @@ def index_nhs_get_without_preload_content( return response_data.response - def _index_nhs_get_serialize( + def _index_nexpose_get_serialize( self, page, limit, @@ -199062,7 +199062,7 @@ def _index_nhs_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/nhs', + resource_path='/v3/index/nexpose', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -199079,7 +199079,7 @@ def _index_nhs_get_serialize( @validate_call - def index_ni_get( + def index_nginx_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -199117,10 +199117,10 @@ def index_ni_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNIPaginatePagination: - """Return vulnerability data stored in index \"ni\" + ) -> RenderResponseWithMetadataArrayAdvisoryNginxAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"nginx\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ni index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** National Instruments Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ni?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ni?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nginx index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nginx Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nginx?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nginx?cursor=` :param page: set the page number of the response :type page: int @@ -199192,7 +199192,7 @@ def index_ni_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ni_get_serialize( + _param = self._index_nginx_get_serialize( page=page, limit=limit, cursor=cursor, @@ -199224,7 +199224,7 @@ def index_ni_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNIPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNginxAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -199240,7 +199240,7 @@ def index_ni_get( @validate_call - def index_ni_get_with_http_info( + def index_nginx_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -199278,10 +199278,10 @@ def index_ni_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNIPaginatePagination]: - """Return vulnerability data stored in index \"ni\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNginxAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"nginx\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ni index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** National Instruments Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ni?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ni?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nginx index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nginx Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nginx?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nginx?cursor=` :param page: set the page number of the response :type page: int @@ -199353,7 +199353,7 @@ def index_ni_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ni_get_serialize( + _param = self._index_nginx_get_serialize( page=page, limit=limit, cursor=cursor, @@ -199385,7 +199385,7 @@ def index_ni_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNIPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNginxAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -199401,7 +199401,7 @@ def index_ni_get_with_http_info( @validate_call - def index_ni_get_without_preload_content( + def index_nginx_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -199440,9 +199440,9 @@ def index_ni_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ni\" + """Return vulnerability data stored in index \"nginx\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ni index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** National Instruments Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ni?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ni?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nginx index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nginx Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nginx?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nginx?cursor=` :param page: set the page number of the response :type page: int @@ -199514,7 +199514,7 @@ def index_ni_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ni_get_serialize( + _param = self._index_nginx_get_serialize( page=page, limit=limit, cursor=cursor, @@ -199546,7 +199546,7 @@ def index_ni_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNIPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNginxAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -199557,7 +199557,7 @@ def index_ni_get_without_preload_content( return response_data.response - def _index_ni_get_serialize( + def _index_nginx_get_serialize( self, page, limit, @@ -199725,7 +199725,7 @@ def _index_ni_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ni', + resource_path='/v3/index/nginx', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -199742,7 +199742,7 @@ def _index_ni_get_serialize( @validate_call - def index_nist_nvd2_cpematch_get( + def index_nhs_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -199780,10 +199780,10 @@ def index_nist_nvd2_cpematch_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiNVD20CPEMatchPaginatePagination: - """Return vulnerability data stored in index \"nist-nvd2-cpematch\" + ) -> RenderResponseWithMetadataArrayAdvisoryNHSPaginatePagination: + """Return vulnerability data stored in index \"nhs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-cpematch index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 CPE Match ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-cpematch?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2-cpematch?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nhs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NHS Cyber Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nhs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nhs?cursor=` :param page: set the page number of the response :type page: int @@ -199855,7 +199855,7 @@ def index_nist_nvd2_cpematch_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nist_nvd2_cpematch_get_serialize( + _param = self._index_nhs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -199887,7 +199887,7 @@ def index_nist_nvd2_cpematch_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiNVD20CPEMatchPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNHSPaginatePagination", '404': "str", '500': "str", } @@ -199903,7 +199903,7 @@ def index_nist_nvd2_cpematch_get( @validate_call - def index_nist_nvd2_cpematch_get_with_http_info( + def index_nhs_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -199941,10 +199941,10 @@ def index_nist_nvd2_cpematch_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiNVD20CPEMatchPaginatePagination]: - """Return vulnerability data stored in index \"nist-nvd2-cpematch\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNHSPaginatePagination]: + """Return vulnerability data stored in index \"nhs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-cpematch index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 CPE Match ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-cpematch?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2-cpematch?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nhs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NHS Cyber Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nhs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nhs?cursor=` :param page: set the page number of the response :type page: int @@ -200016,7 +200016,7 @@ def index_nist_nvd2_cpematch_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nist_nvd2_cpematch_get_serialize( + _param = self._index_nhs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -200048,7 +200048,7 @@ def index_nist_nvd2_cpematch_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiNVD20CPEMatchPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNHSPaginatePagination", '404': "str", '500': "str", } @@ -200064,7 +200064,7 @@ def index_nist_nvd2_cpematch_get_with_http_info( @validate_call - def index_nist_nvd2_cpematch_get_without_preload_content( + def index_nhs_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -200103,9 +200103,9 @@ def index_nist_nvd2_cpematch_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"nist-nvd2-cpematch\" + """Return vulnerability data stored in index \"nhs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-cpematch index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 CPE Match ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-cpematch?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2-cpematch?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nhs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NHS Cyber Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nhs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nhs?cursor=` :param page: set the page number of the response :type page: int @@ -200177,7 +200177,7 @@ def index_nist_nvd2_cpematch_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nist_nvd2_cpematch_get_serialize( + _param = self._index_nhs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -200209,7 +200209,7 @@ def index_nist_nvd2_cpematch_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiNVD20CPEMatchPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNHSPaginatePagination", '404': "str", '500': "str", } @@ -200220,7 +200220,7 @@ def index_nist_nvd2_cpematch_get_without_preload_content( return response_data.response - def _index_nist_nvd2_cpematch_get_serialize( + def _index_nhs_get_serialize( self, page, limit, @@ -200388,7 +200388,7 @@ def _index_nist_nvd2_cpematch_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/nist-nvd2-cpematch', + resource_path='/v3/index/nhs', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -200405,7 +200405,7 @@ def _index_nist_nvd2_cpematch_get_serialize( @validate_call - def index_nist_nvd2_get( + def index_ni_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -200443,10 +200443,10 @@ def index_nist_nvd2_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiNVD20CVEPaginatePagination: - """Return vulnerability data stored in index \"nist-nvd2\" + ) -> RenderResponseWithMetadataArrayAdvisoryNIPaginatePagination: + """Return vulnerability data stored in index \"ni\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ni index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** National Instruments Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ni?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ni?cursor=` :param page: set the page number of the response :type page: int @@ -200518,7 +200518,7 @@ def index_nist_nvd2_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nist_nvd2_get_serialize( + _param = self._index_ni_get_serialize( page=page, limit=limit, cursor=cursor, @@ -200550,7 +200550,7 @@ def index_nist_nvd2_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiNVD20CVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNIPaginatePagination", '404': "str", '500': "str", } @@ -200566,7 +200566,7 @@ def index_nist_nvd2_get( @validate_call - def index_nist_nvd2_get_with_http_info( + def index_ni_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -200604,10 +200604,10 @@ def index_nist_nvd2_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiNVD20CVEPaginatePagination]: - """Return vulnerability data stored in index \"nist-nvd2\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNIPaginatePagination]: + """Return vulnerability data stored in index \"ni\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ni index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** National Instruments Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ni?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ni?cursor=` :param page: set the page number of the response :type page: int @@ -200679,7 +200679,7 @@ def index_nist_nvd2_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nist_nvd2_get_serialize( + _param = self._index_ni_get_serialize( page=page, limit=limit, cursor=cursor, @@ -200711,7 +200711,7 @@ def index_nist_nvd2_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiNVD20CVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNIPaginatePagination", '404': "str", '500': "str", } @@ -200727,7 +200727,7 @@ def index_nist_nvd2_get_with_http_info( @validate_call - def index_nist_nvd2_get_without_preload_content( + def index_ni_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -200766,9 +200766,9 @@ def index_nist_nvd2_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"nist-nvd2\" + """Return vulnerability data stored in index \"ni\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ni index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** National Instruments Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ni?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ni?cursor=` :param page: set the page number of the response :type page: int @@ -200840,7 +200840,7 @@ def index_nist_nvd2_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nist_nvd2_get_serialize( + _param = self._index_ni_get_serialize( page=page, limit=limit, cursor=cursor, @@ -200872,7 +200872,7 @@ def index_nist_nvd2_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiNVD20CVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNIPaginatePagination", '404': "str", '500': "str", } @@ -200883,7 +200883,7 @@ def index_nist_nvd2_get_without_preload_content( return response_data.response - def _index_nist_nvd2_get_serialize( + def _index_ni_get_serialize( self, page, limit, @@ -201051,7 +201051,7 @@ def _index_nist_nvd2_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/nist-nvd2', + resource_path='/v3/index/ni', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -201068,7 +201068,7 @@ def _index_nist_nvd2_get_serialize( @validate_call - def index_nist_nvd2_sources_get( + def index_nist_nvd2_cpematch_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -201106,10 +201106,10 @@ def index_nist_nvd2_sources_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNVD20SourcePaginatePagination: - """Return vulnerability data stored in index \"nist-nvd2-sources\" + ) -> RenderResponseWithMetadataArrayApiNVD20CPEMatchPaginatePagination: + """Return vulnerability data stored in index \"nist-nvd2-cpematch\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-sources index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 Source Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-sources?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2-sources?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-cpematch index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 CPE Match ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-cpematch?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2-cpematch?cursor=` :param page: set the page number of the response :type page: int @@ -201181,7 +201181,7 @@ def index_nist_nvd2_sources_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nist_nvd2_sources_get_serialize( + _param = self._index_nist_nvd2_cpematch_get_serialize( page=page, limit=limit, cursor=cursor, @@ -201213,7 +201213,7 @@ def index_nist_nvd2_sources_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNVD20SourcePaginatePagination", + '200': "RenderResponseWithMetadataArrayApiNVD20CPEMatchPaginatePagination", '404': "str", '500': "str", } @@ -201229,7 +201229,7 @@ def index_nist_nvd2_sources_get( @validate_call - def index_nist_nvd2_sources_get_with_http_info( + def index_nist_nvd2_cpematch_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -201267,10 +201267,10 @@ def index_nist_nvd2_sources_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNVD20SourcePaginatePagination]: - """Return vulnerability data stored in index \"nist-nvd2-sources\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiNVD20CPEMatchPaginatePagination]: + """Return vulnerability data stored in index \"nist-nvd2-cpematch\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-sources index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 Source Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-sources?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2-sources?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-cpematch index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 CPE Match ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-cpematch?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2-cpematch?cursor=` :param page: set the page number of the response :type page: int @@ -201342,7 +201342,7 @@ def index_nist_nvd2_sources_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nist_nvd2_sources_get_serialize( + _param = self._index_nist_nvd2_cpematch_get_serialize( page=page, limit=limit, cursor=cursor, @@ -201374,7 +201374,7 @@ def index_nist_nvd2_sources_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNVD20SourcePaginatePagination", + '200': "RenderResponseWithMetadataArrayApiNVD20CPEMatchPaginatePagination", '404': "str", '500': "str", } @@ -201390,7 +201390,7 @@ def index_nist_nvd2_sources_get_with_http_info( @validate_call - def index_nist_nvd2_sources_get_without_preload_content( + def index_nist_nvd2_cpematch_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -201429,9 +201429,9 @@ def index_nist_nvd2_sources_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"nist-nvd2-sources\" + """Return vulnerability data stored in index \"nist-nvd2-cpematch\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-sources index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 Source Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-sources?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2-sources?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-cpematch index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 CPE Match ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-cpematch?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2-cpematch?cursor=` :param page: set the page number of the response :type page: int @@ -201503,7 +201503,7 @@ def index_nist_nvd2_sources_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nist_nvd2_sources_get_serialize( + _param = self._index_nist_nvd2_cpematch_get_serialize( page=page, limit=limit, cursor=cursor, @@ -201535,7 +201535,7 @@ def index_nist_nvd2_sources_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNVD20SourcePaginatePagination", + '200': "RenderResponseWithMetadataArrayApiNVD20CPEMatchPaginatePagination", '404': "str", '500': "str", } @@ -201546,7 +201546,7 @@ def index_nist_nvd2_sources_get_without_preload_content( return response_data.response - def _index_nist_nvd2_sources_get_serialize( + def _index_nist_nvd2_cpematch_get_serialize( self, page, limit, @@ -201714,7 +201714,7 @@ def _index_nist_nvd2_sources_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/nist-nvd2-sources', + resource_path='/v3/index/nist-nvd2-cpematch', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -201731,7 +201731,7 @@ def _index_nist_nvd2_sources_get_serialize( @validate_call - def index_nist_nvd_get( + def index_nist_nvd2_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -201769,10 +201769,10 @@ def index_nist_nvd_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiCveItemsPaginatePagination: - """Return vulnerability data stored in index \"nist-nvd\" + ) -> RenderResponseWithMetadataArrayApiNVD20CVEPaginatePagination: + """Return vulnerability data stored in index \"nist-nvd2\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 1.0 CVE data built from NIST NVD 2.0 CVE Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2?cursor=` :param page: set the page number of the response :type page: int @@ -201844,7 +201844,7 @@ def index_nist_nvd_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nist_nvd_get_serialize( + _param = self._index_nist_nvd2_get_serialize( page=page, limit=limit, cursor=cursor, @@ -201876,7 +201876,7 @@ def index_nist_nvd_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiCveItemsPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiNVD20CVEPaginatePagination", '404': "str", '500': "str", } @@ -201892,7 +201892,7 @@ def index_nist_nvd_get( @validate_call - def index_nist_nvd_get_with_http_info( + def index_nist_nvd2_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -201930,10 +201930,10 @@ def index_nist_nvd_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiCveItemsPaginatePagination]: - """Return vulnerability data stored in index \"nist-nvd\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiNVD20CVEPaginatePagination]: + """Return vulnerability data stored in index \"nist-nvd2\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 1.0 CVE data built from NIST NVD 2.0 CVE Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2?cursor=` :param page: set the page number of the response :type page: int @@ -202005,7 +202005,7 @@ def index_nist_nvd_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nist_nvd_get_serialize( + _param = self._index_nist_nvd2_get_serialize( page=page, limit=limit, cursor=cursor, @@ -202037,7 +202037,7 @@ def index_nist_nvd_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiCveItemsPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiNVD20CVEPaginatePagination", '404': "str", '500': "str", } @@ -202053,7 +202053,7 @@ def index_nist_nvd_get_with_http_info( @validate_call - def index_nist_nvd_get_without_preload_content( + def index_nist_nvd2_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -202092,9 +202092,9 @@ def index_nist_nvd_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"nist-nvd\" + """Return vulnerability data stored in index \"nist-nvd2\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 1.0 CVE data built from NIST NVD 2.0 CVE Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2 index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2?cursor=` :param page: set the page number of the response :type page: int @@ -202166,7 +202166,7 @@ def index_nist_nvd_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nist_nvd_get_serialize( + _param = self._index_nist_nvd2_get_serialize( page=page, limit=limit, cursor=cursor, @@ -202198,7 +202198,7 @@ def index_nist_nvd_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiCveItemsPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiNVD20CVEPaginatePagination", '404': "str", '500': "str", } @@ -202209,7 +202209,7 @@ def index_nist_nvd_get_without_preload_content( return response_data.response - def _index_nist_nvd_get_serialize( + def _index_nist_nvd2_get_serialize( self, page, limit, @@ -202377,7 +202377,7 @@ def _index_nist_nvd_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/nist-nvd', + resource_path='/v3/index/nist-nvd2', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -202394,7 +202394,7 @@ def _index_nist_nvd_get_serialize( @validate_call - def index_node_security_get( + def index_nist_nvd2_sources_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -202432,10 +202432,10 @@ def index_node_security_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNodeSecurityPaginatePagination: - """Return vulnerability data stored in index \"node-security\" + ) -> RenderResponseWithMetadataArrayAdvisoryNVD20SourcePaginatePagination: + """Return vulnerability data stored in index \"nist-nvd2-sources\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the node-security index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Node.js Security Working Group Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/node-security?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/node-security?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-sources index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 Source Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-sources?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2-sources?cursor=` :param page: set the page number of the response :type page: int @@ -202507,7 +202507,7 @@ def index_node_security_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_node_security_get_serialize( + _param = self._index_nist_nvd2_sources_get_serialize( page=page, limit=limit, cursor=cursor, @@ -202539,7 +202539,7 @@ def index_node_security_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNodeSecurityPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNVD20SourcePaginatePagination", '404': "str", '500': "str", } @@ -202555,7 +202555,7 @@ def index_node_security_get( @validate_call - def index_node_security_get_with_http_info( + def index_nist_nvd2_sources_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -202593,10 +202593,10 @@ def index_node_security_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNodeSecurityPaginatePagination]: - """Return vulnerability data stored in index \"node-security\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNVD20SourcePaginatePagination]: + """Return vulnerability data stored in index \"nist-nvd2-sources\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the node-security index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Node.js Security Working Group Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/node-security?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/node-security?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-sources index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 Source Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-sources?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2-sources?cursor=` :param page: set the page number of the response :type page: int @@ -202668,7 +202668,7 @@ def index_node_security_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_node_security_get_serialize( + _param = self._index_nist_nvd2_sources_get_serialize( page=page, limit=limit, cursor=cursor, @@ -202700,7 +202700,7 @@ def index_node_security_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNodeSecurityPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNVD20SourcePaginatePagination", '404': "str", '500': "str", } @@ -202716,7 +202716,7 @@ def index_node_security_get_with_http_info( @validate_call - def index_node_security_get_without_preload_content( + def index_nist_nvd2_sources_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -202755,9 +202755,9 @@ def index_node_security_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"node-security\" + """Return vulnerability data stored in index \"nist-nvd2-sources\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the node-security index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Node.js Security Working Group Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/node-security?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/node-security?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-sources index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 2.0 Source Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-sources?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd2-sources?cursor=` :param page: set the page number of the response :type page: int @@ -202829,7 +202829,7 @@ def index_node_security_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_node_security_get_serialize( + _param = self._index_nist_nvd2_sources_get_serialize( page=page, limit=limit, cursor=cursor, @@ -202861,7 +202861,7 @@ def index_node_security_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNodeSecurityPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNVD20SourcePaginatePagination", '404': "str", '500': "str", } @@ -202872,7 +202872,7 @@ def index_node_security_get_without_preload_content( return response_data.response - def _index_node_security_get_serialize( + def _index_nist_nvd2_sources_get_serialize( self, page, limit, @@ -203040,7 +203040,7 @@ def _index_node_security_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/node-security', + resource_path='/v3/index/nist-nvd2-sources', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -203057,7 +203057,7 @@ def _index_node_security_get_serialize( @validate_call - def index_nodejs_get( + def index_nist_nvd_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -203095,10 +203095,10 @@ def index_nodejs_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNodeJSPaginatePagination: - """Return vulnerability data stored in index \"nodejs\" + ) -> RenderResponseWithMetadataArrayApiCveItemsPaginatePagination: + """Return vulnerability data stored in index \"nist-nvd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nodejs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NodeJS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nodejs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nodejs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 1.0 CVE data built from NIST NVD 2.0 CVE Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd?cursor=` :param page: set the page number of the response :type page: int @@ -203170,7 +203170,7 @@ def index_nodejs_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nodejs_get_serialize( + _param = self._index_nist_nvd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -203202,7 +203202,7 @@ def index_nodejs_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNodeJSPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiCveItemsPaginatePagination", '404': "str", '500': "str", } @@ -203218,7 +203218,7 @@ def index_nodejs_get( @validate_call - def index_nodejs_get_with_http_info( + def index_nist_nvd_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -203256,10 +203256,10 @@ def index_nodejs_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNodeJSPaginatePagination]: - """Return vulnerability data stored in index \"nodejs\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiCveItemsPaginatePagination]: + """Return vulnerability data stored in index \"nist-nvd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nodejs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NodeJS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nodejs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nodejs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 1.0 CVE data built from NIST NVD 2.0 CVE Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd?cursor=` :param page: set the page number of the response :type page: int @@ -203331,7 +203331,7 @@ def index_nodejs_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nodejs_get_serialize( + _param = self._index_nist_nvd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -203363,7 +203363,7 @@ def index_nodejs_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNodeJSPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiCveItemsPaginatePagination", '404': "str", '500': "str", } @@ -203379,7 +203379,7 @@ def index_nodejs_get_with_http_info( @validate_call - def index_nodejs_get_without_preload_content( + def index_nist_nvd_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -203418,9 +203418,9 @@ def index_nodejs_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"nodejs\" + """Return vulnerability data stored in index \"nist-nvd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nodejs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NodeJS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nodejs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nodejs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nist-nvd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NIST NVD 1.0 CVE data built from NIST NVD 2.0 CVE Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nist-nvd?cursor=` :param page: set the page number of the response :type page: int @@ -203492,7 +203492,7 @@ def index_nodejs_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nodejs_get_serialize( + _param = self._index_nist_nvd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -203524,7 +203524,7 @@ def index_nodejs_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNodeJSPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiCveItemsPaginatePagination", '404': "str", '500': "str", } @@ -203535,7 +203535,7 @@ def index_nodejs_get_without_preload_content( return response_data.response - def _index_nodejs_get_serialize( + def _index_nist_nvd_get_serialize( self, page, limit, @@ -203703,7 +203703,7 @@ def _index_nodejs_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/nodejs', + resource_path='/v3/index/nist-nvd', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -203720,7 +203720,7 @@ def _index_nodejs_get_serialize( @validate_call - def index_nokia_get( + def index_node_security_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -203758,10 +203758,10 @@ def index_nokia_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNokiaPaginatePagination: - """Return vulnerability data stored in index \"nokia\" + ) -> RenderResponseWithMetadataArrayAdvisoryNodeSecurityPaginatePagination: + """Return vulnerability data stored in index \"node-security\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nokia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nokia Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nokia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nokia?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the node-security index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Node.js Security Working Group Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/node-security?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/node-security?cursor=` :param page: set the page number of the response :type page: int @@ -203833,7 +203833,7 @@ def index_nokia_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nokia_get_serialize( + _param = self._index_node_security_get_serialize( page=page, limit=limit, cursor=cursor, @@ -203865,7 +203865,7 @@ def index_nokia_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNokiaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNodeSecurityPaginatePagination", '404': "str", '500': "str", } @@ -203881,7 +203881,7 @@ def index_nokia_get( @validate_call - def index_nokia_get_with_http_info( + def index_node_security_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -203919,10 +203919,10 @@ def index_nokia_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNokiaPaginatePagination]: - """Return vulnerability data stored in index \"nokia\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNodeSecurityPaginatePagination]: + """Return vulnerability data stored in index \"node-security\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nokia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nokia Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nokia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nokia?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the node-security index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Node.js Security Working Group Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/node-security?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/node-security?cursor=` :param page: set the page number of the response :type page: int @@ -203994,7 +203994,7 @@ def index_nokia_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nokia_get_serialize( + _param = self._index_node_security_get_serialize( page=page, limit=limit, cursor=cursor, @@ -204026,7 +204026,7 @@ def index_nokia_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNokiaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNodeSecurityPaginatePagination", '404': "str", '500': "str", } @@ -204042,7 +204042,7 @@ def index_nokia_get_with_http_info( @validate_call - def index_nokia_get_without_preload_content( + def index_node_security_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -204081,9 +204081,9 @@ def index_nokia_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"nokia\" + """Return vulnerability data stored in index \"node-security\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nokia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nokia Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nokia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nokia?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the node-security index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Node.js Security Working Group Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/node-security?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/node-security?cursor=` :param page: set the page number of the response :type page: int @@ -204155,7 +204155,7 @@ def index_nokia_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nokia_get_serialize( + _param = self._index_node_security_get_serialize( page=page, limit=limit, cursor=cursor, @@ -204187,7 +204187,7 @@ def index_nokia_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNokiaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNodeSecurityPaginatePagination", '404': "str", '500': "str", } @@ -204198,7 +204198,7 @@ def index_nokia_get_without_preload_content( return response_data.response - def _index_nokia_get_serialize( + def _index_node_security_get_serialize( self, page, limit, @@ -204366,7 +204366,7 @@ def _index_nokia_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/nokia', + resource_path='/v3/index/node-security', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -204383,7 +204383,7 @@ def _index_nokia_get_serialize( @validate_call - def index_notepadplusplus_get( + def index_nodejs_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -204421,10 +204421,10 @@ def index_notepadplusplus_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNotePadPlusPlusPaginatePagination: - """Return vulnerability data stored in index \"notepadplusplus\" + ) -> RenderResponseWithMetadataArrayAdvisoryNodeJSPaginatePagination: + """Return vulnerability data stored in index \"nodejs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the notepadplusplus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Notepad++ Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/notepadplusplus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/notepadplusplus?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nodejs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NodeJS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nodejs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nodejs?cursor=` :param page: set the page number of the response :type page: int @@ -204496,7 +204496,7 @@ def index_notepadplusplus_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_notepadplusplus_get_serialize( + _param = self._index_nodejs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -204528,7 +204528,7 @@ def index_notepadplusplus_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNotePadPlusPlusPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNodeJSPaginatePagination", '404': "str", '500': "str", } @@ -204544,7 +204544,7 @@ def index_notepadplusplus_get( @validate_call - def index_notepadplusplus_get_with_http_info( + def index_nodejs_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -204582,10 +204582,10 @@ def index_notepadplusplus_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNotePadPlusPlusPaginatePagination]: - """Return vulnerability data stored in index \"notepadplusplus\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNodeJSPaginatePagination]: + """Return vulnerability data stored in index \"nodejs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the notepadplusplus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Notepad++ Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/notepadplusplus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/notepadplusplus?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nodejs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NodeJS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nodejs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nodejs?cursor=` :param page: set the page number of the response :type page: int @@ -204657,7 +204657,7 @@ def index_notepadplusplus_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_notepadplusplus_get_serialize( + _param = self._index_nodejs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -204689,7 +204689,7 @@ def index_notepadplusplus_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNotePadPlusPlusPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNodeJSPaginatePagination", '404': "str", '500': "str", } @@ -204705,7 +204705,7 @@ def index_notepadplusplus_get_with_http_info( @validate_call - def index_notepadplusplus_get_without_preload_content( + def index_nodejs_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -204744,9 +204744,9 @@ def index_notepadplusplus_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"notepadplusplus\" + """Return vulnerability data stored in index \"nodejs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the notepadplusplus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Notepad++ Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/notepadplusplus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/notepadplusplus?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nodejs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NodeJS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nodejs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nodejs?cursor=` :param page: set the page number of the response :type page: int @@ -204818,7 +204818,7 @@ def index_notepadplusplus_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_notepadplusplus_get_serialize( + _param = self._index_nodejs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -204850,7 +204850,7 @@ def index_notepadplusplus_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNotePadPlusPlusPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNodeJSPaginatePagination", '404': "str", '500': "str", } @@ -204861,7 +204861,7 @@ def index_notepadplusplus_get_without_preload_content( return response_data.response - def _index_notepadplusplus_get_serialize( + def _index_nodejs_get_serialize( self, page, limit, @@ -205029,7 +205029,7 @@ def _index_notepadplusplus_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/notepadplusplus', + resource_path='/v3/index/nodejs', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -205046,7 +205046,7 @@ def _index_notepadplusplus_get_serialize( @validate_call - def index_nozomi_get( + def index_nokia_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -205084,10 +205084,10 @@ def index_nozomi_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNozomiPaginatePagination: - """Return vulnerability data stored in index \"nozomi\" + ) -> RenderResponseWithMetadataArrayAdvisoryNokiaPaginatePagination: + """Return vulnerability data stored in index \"nokia\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nozomi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nozomi Networks Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nozomi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nozomi?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nokia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nokia Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nokia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nokia?cursor=` :param page: set the page number of the response :type page: int @@ -205159,7 +205159,7 @@ def index_nozomi_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nozomi_get_serialize( + _param = self._index_nokia_get_serialize( page=page, limit=limit, cursor=cursor, @@ -205191,7 +205191,7 @@ def index_nozomi_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNozomiPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNokiaPaginatePagination", '404': "str", '500': "str", } @@ -205207,7 +205207,7 @@ def index_nozomi_get( @validate_call - def index_nozomi_get_with_http_info( + def index_nokia_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -205245,10 +205245,10 @@ def index_nozomi_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNozomiPaginatePagination]: - """Return vulnerability data stored in index \"nozomi\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNokiaPaginatePagination]: + """Return vulnerability data stored in index \"nokia\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nozomi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nozomi Networks Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nozomi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nozomi?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nokia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nokia Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nokia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nokia?cursor=` :param page: set the page number of the response :type page: int @@ -205320,7 +205320,7 @@ def index_nozomi_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nozomi_get_serialize( + _param = self._index_nokia_get_serialize( page=page, limit=limit, cursor=cursor, @@ -205352,7 +205352,7 @@ def index_nozomi_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNozomiPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNokiaPaginatePagination", '404': "str", '500': "str", } @@ -205368,7 +205368,7 @@ def index_nozomi_get_with_http_info( @validate_call - def index_nozomi_get_without_preload_content( + def index_nokia_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -205407,9 +205407,9 @@ def index_nozomi_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"nozomi\" + """Return vulnerability data stored in index \"nokia\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nozomi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nozomi Networks Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nozomi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nozomi?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nokia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nokia Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nokia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nokia?cursor=` :param page: set the page number of the response :type page: int @@ -205481,7 +205481,7 @@ def index_nozomi_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nozomi_get_serialize( + _param = self._index_nokia_get_serialize( page=page, limit=limit, cursor=cursor, @@ -205513,7 +205513,7 @@ def index_nozomi_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNozomiPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNokiaPaginatePagination", '404': "str", '500': "str", } @@ -205524,7 +205524,7 @@ def index_nozomi_get_without_preload_content( return response_data.response - def _index_nozomi_get_serialize( + def _index_nokia_get_serialize( self, page, limit, @@ -205692,7 +205692,7 @@ def _index_nozomi_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/nozomi', + resource_path='/v3/index/nokia', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -205709,7 +205709,7 @@ def _index_nozomi_get_serialize( @validate_call - def index_npm_get( + def index_notepadplusplus_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -205747,10 +205747,10 @@ def index_npm_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: - """Return vulnerability data stored in index \"npm\" + ) -> RenderResponseWithMetadataArrayAdvisoryNotePadPlusPlusPaginatePagination: + """Return vulnerability data stored in index \"notepadplusplus\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the npm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NPM (JS/TS) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/npm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/npm?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the notepadplusplus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Notepad++ Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/notepadplusplus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/notepadplusplus?cursor=` :param page: set the page number of the response :type page: int @@ -205822,7 +205822,7 @@ def index_npm_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_npm_get_serialize( + _param = self._index_notepadplusplus_get_serialize( page=page, limit=limit, cursor=cursor, @@ -205854,7 +205854,7 @@ def index_npm_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNotePadPlusPlusPaginatePagination", '404': "str", '500': "str", } @@ -205870,7 +205870,7 @@ def index_npm_get( @validate_call - def index_npm_get_with_http_info( + def index_notepadplusplus_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -205908,10 +205908,10 @@ def index_npm_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: - """Return vulnerability data stored in index \"npm\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNotePadPlusPlusPaginatePagination]: + """Return vulnerability data stored in index \"notepadplusplus\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the npm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NPM (JS/TS) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/npm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/npm?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the notepadplusplus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Notepad++ Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/notepadplusplus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/notepadplusplus?cursor=` :param page: set the page number of the response :type page: int @@ -205983,7 +205983,7 @@ def index_npm_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_npm_get_serialize( + _param = self._index_notepadplusplus_get_serialize( page=page, limit=limit, cursor=cursor, @@ -206015,7 +206015,7 @@ def index_npm_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNotePadPlusPlusPaginatePagination", '404': "str", '500': "str", } @@ -206031,7 +206031,7 @@ def index_npm_get_with_http_info( @validate_call - def index_npm_get_without_preload_content( + def index_notepadplusplus_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -206070,9 +206070,9 @@ def index_npm_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"npm\" + """Return vulnerability data stored in index \"notepadplusplus\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the npm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NPM (JS/TS) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/npm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/npm?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the notepadplusplus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Notepad++ Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/notepadplusplus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/notepadplusplus?cursor=` :param page: set the page number of the response :type page: int @@ -206144,7 +206144,7 @@ def index_npm_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_npm_get_serialize( + _param = self._index_notepadplusplus_get_serialize( page=page, limit=limit, cursor=cursor, @@ -206176,7 +206176,7 @@ def index_npm_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNotePadPlusPlusPaginatePagination", '404': "str", '500': "str", } @@ -206187,7 +206187,7 @@ def index_npm_get_without_preload_content( return response_data.response - def _index_npm_get_serialize( + def _index_notepadplusplus_get_serialize( self, page, limit, @@ -206355,7 +206355,7 @@ def _index_npm_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/npm', + resource_path='/v3/index/notepadplusplus', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -206372,7 +206372,7 @@ def _index_npm_get_serialize( @validate_call - def index_ntp_get( + def index_nozomi_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -206410,10 +206410,10 @@ def index_ntp_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNTPPaginatePagination: - """Return vulnerability data stored in index \"ntp\" + ) -> RenderResponseWithMetadataArrayAdvisoryNozomiPaginatePagination: + """Return vulnerability data stored in index \"nozomi\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ntp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NTP Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ntp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ntp?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nozomi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nozomi Networks Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nozomi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nozomi?cursor=` :param page: set the page number of the response :type page: int @@ -206485,7 +206485,7 @@ def index_ntp_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ntp_get_serialize( + _param = self._index_nozomi_get_serialize( page=page, limit=limit, cursor=cursor, @@ -206517,7 +206517,7 @@ def index_ntp_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNTPPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNozomiPaginatePagination", '404': "str", '500': "str", } @@ -206533,7 +206533,7 @@ def index_ntp_get( @validate_call - def index_ntp_get_with_http_info( + def index_nozomi_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -206571,10 +206571,10 @@ def index_ntp_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNTPPaginatePagination]: - """Return vulnerability data stored in index \"ntp\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNozomiPaginatePagination]: + """Return vulnerability data stored in index \"nozomi\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ntp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NTP Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ntp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ntp?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nozomi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nozomi Networks Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nozomi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nozomi?cursor=` :param page: set the page number of the response :type page: int @@ -206646,7 +206646,7 @@ def index_ntp_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ntp_get_serialize( + _param = self._index_nozomi_get_serialize( page=page, limit=limit, cursor=cursor, @@ -206678,7 +206678,7 @@ def index_ntp_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNTPPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNozomiPaginatePagination", '404': "str", '500': "str", } @@ -206694,7 +206694,7 @@ def index_ntp_get_with_http_info( @validate_call - def index_ntp_get_without_preload_content( + def index_nozomi_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -206733,9 +206733,9 @@ def index_ntp_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ntp\" + """Return vulnerability data stored in index \"nozomi\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ntp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NTP Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ntp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ntp?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nozomi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nozomi Networks Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nozomi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nozomi?cursor=` :param page: set the page number of the response :type page: int @@ -206807,7 +206807,7 @@ def index_ntp_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ntp_get_serialize( + _param = self._index_nozomi_get_serialize( page=page, limit=limit, cursor=cursor, @@ -206839,7 +206839,7 @@ def index_ntp_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNTPPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNozomiPaginatePagination", '404': "str", '500': "str", } @@ -206850,7 +206850,7 @@ def index_ntp_get_without_preload_content( return response_data.response - def _index_ntp_get_serialize( + def _index_nozomi_get_serialize( self, page, limit, @@ -207018,7 +207018,7 @@ def _index_ntp_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ntp', + resource_path='/v3/index/nozomi', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -207035,7 +207035,7 @@ def _index_ntp_get_serialize( @validate_call - def index_nuclei_get( + def index_npm_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -207073,10 +207073,10 @@ def index_nuclei_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNucleiPaginatePagination: - """Return vulnerability data stored in index \"nuclei\" + ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: + """Return vulnerability data stored in index \"npm\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nuclei index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nuclei Templates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nuclei?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nuclei?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the npm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NPM (JS/TS) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/npm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/npm?cursor=` :param page: set the page number of the response :type page: int @@ -207148,7 +207148,7 @@ def index_nuclei_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nuclei_get_serialize( + _param = self._index_npm_get_serialize( page=page, limit=limit, cursor=cursor, @@ -207180,7 +207180,7 @@ def index_nuclei_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNucleiPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -207196,7 +207196,7 @@ def index_nuclei_get( @validate_call - def index_nuclei_get_with_http_info( + def index_npm_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -207234,10 +207234,10 @@ def index_nuclei_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNucleiPaginatePagination]: - """Return vulnerability data stored in index \"nuclei\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: + """Return vulnerability data stored in index \"npm\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nuclei index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nuclei Templates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nuclei?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nuclei?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the npm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NPM (JS/TS) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/npm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/npm?cursor=` :param page: set the page number of the response :type page: int @@ -207309,7 +207309,7 @@ def index_nuclei_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nuclei_get_serialize( + _param = self._index_npm_get_serialize( page=page, limit=limit, cursor=cursor, @@ -207341,7 +207341,7 @@ def index_nuclei_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNucleiPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -207357,7 +207357,7 @@ def index_nuclei_get_with_http_info( @validate_call - def index_nuclei_get_without_preload_content( + def index_npm_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -207396,9 +207396,9 @@ def index_nuclei_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"nuclei\" + """Return vulnerability data stored in index \"npm\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nuclei index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nuclei Templates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nuclei?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nuclei?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the npm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NPM (JS/TS) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/npm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/npm?cursor=` :param page: set the page number of the response :type page: int @@ -207470,7 +207470,7 @@ def index_nuclei_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nuclei_get_serialize( + _param = self._index_npm_get_serialize( page=page, limit=limit, cursor=cursor, @@ -207502,7 +207502,7 @@ def index_nuclei_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNucleiPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -207513,7 +207513,7 @@ def index_nuclei_get_without_preload_content( return response_data.response - def _index_nuclei_get_serialize( + def _index_npm_get_serialize( self, page, limit, @@ -207681,7 +207681,7 @@ def _index_nuclei_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/nuclei', + resource_path='/v3/index/npm', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -207698,7 +207698,7 @@ def _index_nuclei_get_serialize( @validate_call - def index_nuget_get( + def index_ntp_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -207736,10 +207736,10 @@ def index_nuget_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: - """Return vulnerability data stored in index \"nuget\" + ) -> RenderResponseWithMetadataArrayAdvisoryNTPPaginatePagination: + """Return vulnerability data stored in index \"ntp\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nuget index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nuget (C#/F#) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nuget?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nuget?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ntp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NTP Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ntp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ntp?cursor=` :param page: set the page number of the response :type page: int @@ -207811,7 +207811,7 @@ def index_nuget_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nuget_get_serialize( + _param = self._index_ntp_get_serialize( page=page, limit=limit, cursor=cursor, @@ -207843,7 +207843,7 @@ def index_nuget_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNTPPaginatePagination", '404': "str", '500': "str", } @@ -207859,7 +207859,7 @@ def index_nuget_get( @validate_call - def index_nuget_get_with_http_info( + def index_ntp_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -207897,10 +207897,10 @@ def index_nuget_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: - """Return vulnerability data stored in index \"nuget\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNTPPaginatePagination]: + """Return vulnerability data stored in index \"ntp\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nuget index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nuget (C#/F#) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nuget?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nuget?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ntp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NTP Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ntp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ntp?cursor=` :param page: set the page number of the response :type page: int @@ -207972,7 +207972,7 @@ def index_nuget_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nuget_get_serialize( + _param = self._index_ntp_get_serialize( page=page, limit=limit, cursor=cursor, @@ -208004,7 +208004,7 @@ def index_nuget_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNTPPaginatePagination", '404': "str", '500': "str", } @@ -208020,7 +208020,7 @@ def index_nuget_get_with_http_info( @validate_call - def index_nuget_get_without_preload_content( + def index_ntp_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -208059,9 +208059,9 @@ def index_nuget_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"nuget\" + """Return vulnerability data stored in index \"ntp\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nuget index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nuget (C#/F#) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nuget?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nuget?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ntp index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NTP Security Issues ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ntp?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ntp?cursor=` :param page: set the page number of the response :type page: int @@ -208133,7 +208133,7 @@ def index_nuget_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nuget_get_serialize( + _param = self._index_ntp_get_serialize( page=page, limit=limit, cursor=cursor, @@ -208165,7 +208165,7 @@ def index_nuget_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNTPPaginatePagination", '404': "str", '500': "str", } @@ -208176,7 +208176,7 @@ def index_nuget_get_without_preload_content( return response_data.response - def _index_nuget_get_serialize( + def _index_ntp_get_serialize( self, page, limit, @@ -208344,7 +208344,7 @@ def _index_nuget_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/nuget', + resource_path='/v3/index/ntp', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -208361,7 +208361,7 @@ def _index_nuget_get_serialize( @validate_call - def index_nvd_cpe_dictionary_get( + def index_nuclei_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -208399,10 +208399,10 @@ def index_nvd_cpe_dictionary_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNVDCPEDictionaryPaginatePagination: - """Return vulnerability data stored in index \"nvd-cpe-dictionary\" + ) -> RenderResponseWithMetadataArrayAdvisoryNucleiPaginatePagination: + """Return vulnerability data stored in index \"nuclei\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nvd-cpe-dictionary index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NVD's CPE Dictionary ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nvd-cpe-dictionary?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nvd-cpe-dictionary?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nuclei index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nuclei Templates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nuclei?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nuclei?cursor=` :param page: set the page number of the response :type page: int @@ -208474,7 +208474,7 @@ def index_nvd_cpe_dictionary_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nvd_cpe_dictionary_get_serialize( + _param = self._index_nuclei_get_serialize( page=page, limit=limit, cursor=cursor, @@ -208506,7 +208506,7 @@ def index_nvd_cpe_dictionary_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNVDCPEDictionaryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNucleiPaginatePagination", '404': "str", '500': "str", } @@ -208522,7 +208522,7 @@ def index_nvd_cpe_dictionary_get( @validate_call - def index_nvd_cpe_dictionary_get_with_http_info( + def index_nuclei_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -208560,10 +208560,10 @@ def index_nvd_cpe_dictionary_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNVDCPEDictionaryPaginatePagination]: - """Return vulnerability data stored in index \"nvd-cpe-dictionary\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNucleiPaginatePagination]: + """Return vulnerability data stored in index \"nuclei\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nvd-cpe-dictionary index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NVD's CPE Dictionary ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nvd-cpe-dictionary?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nvd-cpe-dictionary?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nuclei index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nuclei Templates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nuclei?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nuclei?cursor=` :param page: set the page number of the response :type page: int @@ -208635,7 +208635,7 @@ def index_nvd_cpe_dictionary_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nvd_cpe_dictionary_get_serialize( + _param = self._index_nuclei_get_serialize( page=page, limit=limit, cursor=cursor, @@ -208667,7 +208667,7 @@ def index_nvd_cpe_dictionary_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNVDCPEDictionaryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNucleiPaginatePagination", '404': "str", '500': "str", } @@ -208683,7 +208683,7 @@ def index_nvd_cpe_dictionary_get_with_http_info( @validate_call - def index_nvd_cpe_dictionary_get_without_preload_content( + def index_nuclei_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -208722,9 +208722,9 @@ def index_nvd_cpe_dictionary_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"nvd-cpe-dictionary\" + """Return vulnerability data stored in index \"nuclei\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nvd-cpe-dictionary index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NVD's CPE Dictionary ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nvd-cpe-dictionary?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nvd-cpe-dictionary?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nuclei index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nuclei Templates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nuclei?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nuclei?cursor=` :param page: set the page number of the response :type page: int @@ -208796,7 +208796,7 @@ def index_nvd_cpe_dictionary_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nvd_cpe_dictionary_get_serialize( + _param = self._index_nuclei_get_serialize( page=page, limit=limit, cursor=cursor, @@ -208828,7 +208828,7 @@ def index_nvd_cpe_dictionary_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNVDCPEDictionaryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNucleiPaginatePagination", '404': "str", '500': "str", } @@ -208839,7 +208839,7 @@ def index_nvd_cpe_dictionary_get_without_preload_content( return response_data.response - def _index_nvd_cpe_dictionary_get_serialize( + def _index_nuclei_get_serialize( self, page, limit, @@ -209007,7 +209007,7 @@ def _index_nvd_cpe_dictionary_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/nvd-cpe-dictionary', + resource_path='/v3/index/nuclei', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -209024,7 +209024,7 @@ def _index_nvd_cpe_dictionary_get_serialize( @validate_call - def index_nvidia_get( + def index_nuget_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -209062,10 +209062,10 @@ def index_nvidia_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySecurityBulletinPaginatePagination: - """Return vulnerability data stored in index \"nvidia\" + ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: + """Return vulnerability data stored in index \"nuget\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nvidia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NVIDIA Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nvidia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nvidia?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nuget index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nuget (C#/F#) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nuget?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nuget?cursor=` :param page: set the page number of the response :type page: int @@ -209137,7 +209137,7 @@ def index_nvidia_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nvidia_get_serialize( + _param = self._index_nuget_get_serialize( page=page, limit=limit, cursor=cursor, @@ -209169,7 +209169,7 @@ def index_nvidia_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySecurityBulletinPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -209185,7 +209185,7 @@ def index_nvidia_get( @validate_call - def index_nvidia_get_with_http_info( + def index_nuget_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -209223,10 +209223,10 @@ def index_nvidia_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySecurityBulletinPaginatePagination]: - """Return vulnerability data stored in index \"nvidia\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: + """Return vulnerability data stored in index \"nuget\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nvidia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NVIDIA Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nvidia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nvidia?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nuget index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nuget (C#/F#) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nuget?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nuget?cursor=` :param page: set the page number of the response :type page: int @@ -209298,7 +209298,7 @@ def index_nvidia_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nvidia_get_serialize( + _param = self._index_nuget_get_serialize( page=page, limit=limit, cursor=cursor, @@ -209330,7 +209330,7 @@ def index_nvidia_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySecurityBulletinPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -209346,7 +209346,7 @@ def index_nvidia_get_with_http_info( @validate_call - def index_nvidia_get_without_preload_content( + def index_nuget_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -209385,9 +209385,9 @@ def index_nvidia_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"nvidia\" + """Return vulnerability data stored in index \"nuget\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nvidia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NVIDIA Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nvidia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nvidia?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nuget index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Nuget (C#/F#) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nuget?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nuget?cursor=` :param page: set the page number of the response :type page: int @@ -209459,7 +209459,7 @@ def index_nvidia_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nvidia_get_serialize( + _param = self._index_nuget_get_serialize( page=page, limit=limit, cursor=cursor, @@ -209491,7 +209491,7 @@ def index_nvidia_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySecurityBulletinPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -209502,7 +209502,7 @@ def index_nvidia_get_without_preload_content( return response_data.response - def _index_nvidia_get_serialize( + def _index_nuget_get_serialize( self, page, limit, @@ -209670,7 +209670,7 @@ def _index_nvidia_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/nvidia', + resource_path='/v3/index/nuget', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -209687,7 +209687,7 @@ def _index_nvidia_get_serialize( @validate_call - def index_nz_advisories_get( + def index_nvd_cpe_dictionary_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -209725,10 +209725,10 @@ def index_nz_advisories_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryNZAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"nz-advisories\" + ) -> RenderResponseWithMetadataArrayAdvisoryNVDCPEDictionaryPaginatePagination: + """Return vulnerability data stored in index \"nvd-cpe-dictionary\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nz-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CERT NZ Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nz-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nz-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nvd-cpe-dictionary index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NVD's CPE Dictionary ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nvd-cpe-dictionary?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nvd-cpe-dictionary?cursor=` :param page: set the page number of the response :type page: int @@ -209800,7 +209800,7 @@ def index_nz_advisories_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nz_advisories_get_serialize( + _param = self._index_nvd_cpe_dictionary_get_serialize( page=page, limit=limit, cursor=cursor, @@ -209832,7 +209832,7 @@ def index_nz_advisories_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNZAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNVDCPEDictionaryPaginatePagination", '404': "str", '500': "str", } @@ -209848,7 +209848,7 @@ def index_nz_advisories_get( @validate_call - def index_nz_advisories_get_with_http_info( + def index_nvd_cpe_dictionary_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -209886,10 +209886,10 @@ def index_nz_advisories_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNZAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"nz-advisories\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNVDCPEDictionaryPaginatePagination]: + """Return vulnerability data stored in index \"nvd-cpe-dictionary\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nz-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CERT NZ Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nz-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nz-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nvd-cpe-dictionary index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NVD's CPE Dictionary ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nvd-cpe-dictionary?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nvd-cpe-dictionary?cursor=` :param page: set the page number of the response :type page: int @@ -209961,7 +209961,7 @@ def index_nz_advisories_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nz_advisories_get_serialize( + _param = self._index_nvd_cpe_dictionary_get_serialize( page=page, limit=limit, cursor=cursor, @@ -209993,7 +209993,7 @@ def index_nz_advisories_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNZAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNVDCPEDictionaryPaginatePagination", '404': "str", '500': "str", } @@ -210009,7 +210009,7 @@ def index_nz_advisories_get_with_http_info( @validate_call - def index_nz_advisories_get_without_preload_content( + def index_nvd_cpe_dictionary_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -210048,9 +210048,9 @@ def index_nz_advisories_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"nz-advisories\" + """Return vulnerability data stored in index \"nvd-cpe-dictionary\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nz-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CERT NZ Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nz-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nz-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nvd-cpe-dictionary index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NVD's CPE Dictionary ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nvd-cpe-dictionary?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nvd-cpe-dictionary?cursor=` :param page: set the page number of the response :type page: int @@ -210122,7 +210122,7 @@ def index_nz_advisories_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_nz_advisories_get_serialize( + _param = self._index_nvd_cpe_dictionary_get_serialize( page=page, limit=limit, cursor=cursor, @@ -210154,7 +210154,7 @@ def index_nz_advisories_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryNZAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNVDCPEDictionaryPaginatePagination", '404': "str", '500': "str", } @@ -210165,7 +210165,7 @@ def index_nz_advisories_get_without_preload_content( return response_data.response - def _index_nz_advisories_get_serialize( + def _index_nvd_cpe_dictionary_get_serialize( self, page, limit, @@ -210333,7 +210333,7 @@ def _index_nz_advisories_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/nz-advisories', + resource_path='/v3/index/nvd-cpe-dictionary', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -210350,7 +210350,7 @@ def _index_nz_advisories_get_serialize( @validate_call - def index_octopus_deploy_get( + def index_nvidia_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -210388,10 +210388,10 @@ def index_octopus_deploy_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOctopusDeployPaginatePagination: - """Return vulnerability data stored in index \"octopus-deploy\" + ) -> RenderResponseWithMetadataArrayAdvisorySecurityBulletinPaginatePagination: + """Return vulnerability data stored in index \"nvidia\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the octopus-deploy index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Octopus Deploy Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/octopus-deploy?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/octopus-deploy?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nvidia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NVIDIA Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nvidia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nvidia?cursor=` :param page: set the page number of the response :type page: int @@ -210463,7 +210463,7 @@ def index_octopus_deploy_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_octopus_deploy_get_serialize( + _param = self._index_nvidia_get_serialize( page=page, limit=limit, cursor=cursor, @@ -210495,7 +210495,7 @@ def index_octopus_deploy_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOctopusDeployPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySecurityBulletinPaginatePagination", '404': "str", '500': "str", } @@ -210511,7 +210511,7 @@ def index_octopus_deploy_get( @validate_call - def index_octopus_deploy_get_with_http_info( + def index_nvidia_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -210549,10 +210549,10 @@ def index_octopus_deploy_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOctopusDeployPaginatePagination]: - """Return vulnerability data stored in index \"octopus-deploy\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySecurityBulletinPaginatePagination]: + """Return vulnerability data stored in index \"nvidia\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the octopus-deploy index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Octopus Deploy Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/octopus-deploy?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/octopus-deploy?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nvidia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NVIDIA Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nvidia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nvidia?cursor=` :param page: set the page number of the response :type page: int @@ -210624,7 +210624,7 @@ def index_octopus_deploy_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_octopus_deploy_get_serialize( + _param = self._index_nvidia_get_serialize( page=page, limit=limit, cursor=cursor, @@ -210656,7 +210656,7 @@ def index_octopus_deploy_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOctopusDeployPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySecurityBulletinPaginatePagination", '404': "str", '500': "str", } @@ -210672,7 +210672,7 @@ def index_octopus_deploy_get_with_http_info( @validate_call - def index_octopus_deploy_get_without_preload_content( + def index_nvidia_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -210711,9 +210711,9 @@ def index_octopus_deploy_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"octopus-deploy\" + """Return vulnerability data stored in index \"nvidia\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the octopus-deploy index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Octopus Deploy Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/octopus-deploy?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/octopus-deploy?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nvidia index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** NVIDIA Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nvidia?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nvidia?cursor=` :param page: set the page number of the response :type page: int @@ -210785,7 +210785,7 @@ def index_octopus_deploy_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_octopus_deploy_get_serialize( + _param = self._index_nvidia_get_serialize( page=page, limit=limit, cursor=cursor, @@ -210817,7 +210817,7 @@ def index_octopus_deploy_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOctopusDeployPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySecurityBulletinPaginatePagination", '404': "str", '500': "str", } @@ -210828,7 +210828,7 @@ def index_octopus_deploy_get_without_preload_content( return response_data.response - def _index_octopus_deploy_get_serialize( + def _index_nvidia_get_serialize( self, page, limit, @@ -210996,7 +210996,7 @@ def _index_octopus_deploy_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/octopus-deploy', + resource_path='/v3/index/nvidia', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -211013,7 +211013,7 @@ def _index_octopus_deploy_get_serialize( @validate_call - def index_okta_get( + def index_nz_advisories_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -211051,10 +211051,10 @@ def index_okta_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOktaPaginatePagination: - """Return vulnerability data stored in index \"okta\" + ) -> RenderResponseWithMetadataArrayAdvisoryNZAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"nz-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the okta index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Okta Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/okta?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/okta?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nz-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CERT NZ Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nz-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nz-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -211126,7 +211126,7 @@ def index_okta_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_okta_get_serialize( + _param = self._index_nz_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -211158,7 +211158,7 @@ def index_okta_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOktaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNZAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -211174,7 +211174,7 @@ def index_okta_get( @validate_call - def index_okta_get_with_http_info( + def index_nz_advisories_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -211212,10 +211212,10 @@ def index_okta_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOktaPaginatePagination]: - """Return vulnerability data stored in index \"okta\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryNZAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"nz-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the okta index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Okta Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/okta?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/okta?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nz-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CERT NZ Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nz-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nz-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -211287,7 +211287,7 @@ def index_okta_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_okta_get_serialize( + _param = self._index_nz_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -211319,7 +211319,7 @@ def index_okta_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOktaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNZAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -211335,7 +211335,7 @@ def index_okta_get_with_http_info( @validate_call - def index_okta_get_without_preload_content( + def index_nz_advisories_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -211374,9 +211374,9 @@ def index_okta_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"okta\" + """Return vulnerability data stored in index \"nz-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the okta index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Okta Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/okta?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/okta?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the nz-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CERT NZ Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/nz-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/nz-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -211448,7 +211448,7 @@ def index_okta_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_okta_get_serialize( + _param = self._index_nz_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -211480,7 +211480,7 @@ def index_okta_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOktaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryNZAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -211491,7 +211491,7 @@ def index_okta_get_without_preload_content( return response_data.response - def _index_okta_get_serialize( + def _index_nz_advisories_get_serialize( self, page, limit, @@ -211659,7 +211659,7 @@ def _index_okta_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/okta', + resource_path='/v3/index/nz-advisories', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -211676,7 +211676,7 @@ def _index_okta_get_serialize( @validate_call - def index_omron_eol_get( + def index_octopus_deploy_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -211714,10 +211714,10 @@ def index_omron_eol_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination: - """Return vulnerability data stored in index \"omron-eol\" + ) -> RenderResponseWithMetadataArrayAdvisoryOctopusDeployPaginatePagination: + """Return vulnerability data stored in index \"octopus-deploy\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the omron-eol index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Omron End of Life Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/omron-eol?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/omron-eol?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the octopus-deploy index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Octopus Deploy Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/octopus-deploy?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/octopus-deploy?cursor=` :param page: set the page number of the response :type page: int @@ -211789,7 +211789,7 @@ def index_omron_eol_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_omron_eol_get_serialize( + _param = self._index_octopus_deploy_get_serialize( page=page, limit=limit, cursor=cursor, @@ -211821,7 +211821,7 @@ def index_omron_eol_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOctopusDeployPaginatePagination", '404': "str", '500': "str", } @@ -211837,7 +211837,7 @@ def index_omron_eol_get( @validate_call - def index_omron_eol_get_with_http_info( + def index_octopus_deploy_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -211875,10 +211875,10 @@ def index_omron_eol_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination]: - """Return vulnerability data stored in index \"omron-eol\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOctopusDeployPaginatePagination]: + """Return vulnerability data stored in index \"octopus-deploy\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the omron-eol index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Omron End of Life Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/omron-eol?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/omron-eol?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the octopus-deploy index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Octopus Deploy Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/octopus-deploy?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/octopus-deploy?cursor=` :param page: set the page number of the response :type page: int @@ -211950,7 +211950,7 @@ def index_omron_eol_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_omron_eol_get_serialize( + _param = self._index_octopus_deploy_get_serialize( page=page, limit=limit, cursor=cursor, @@ -211982,7 +211982,7 @@ def index_omron_eol_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOctopusDeployPaginatePagination", '404': "str", '500': "str", } @@ -211998,7 +211998,7 @@ def index_omron_eol_get_with_http_info( @validate_call - def index_omron_eol_get_without_preload_content( + def index_octopus_deploy_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -212037,9 +212037,9 @@ def index_omron_eol_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"omron-eol\" + """Return vulnerability data stored in index \"octopus-deploy\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the omron-eol index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Omron End of Life Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/omron-eol?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/omron-eol?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the octopus-deploy index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Octopus Deploy Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/octopus-deploy?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/octopus-deploy?cursor=` :param page: set the page number of the response :type page: int @@ -212111,7 +212111,7 @@ def index_omron_eol_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_omron_eol_get_serialize( + _param = self._index_octopus_deploy_get_serialize( page=page, limit=limit, cursor=cursor, @@ -212143,7 +212143,7 @@ def index_omron_eol_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOctopusDeployPaginatePagination", '404': "str", '500': "str", } @@ -212154,7 +212154,7 @@ def index_omron_eol_get_without_preload_content( return response_data.response - def _index_omron_eol_get_serialize( + def _index_octopus_deploy_get_serialize( self, page, limit, @@ -212322,7 +212322,7 @@ def _index_omron_eol_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/omron-eol', + resource_path='/v3/index/octopus-deploy', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -212339,7 +212339,7 @@ def _index_omron_eol_get_serialize( @validate_call - def index_omron_get( + def index_okta_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -212377,10 +212377,10 @@ def index_omron_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination: - """Return vulnerability data stored in index \"omron\" + ) -> RenderResponseWithMetadataArrayAdvisoryOktaPaginatePagination: + """Return vulnerability data stored in index \"okta\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the omron index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Omron Vulnerability Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/omron?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/omron?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the okta index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Okta Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/okta?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/okta?cursor=` :param page: set the page number of the response :type page: int @@ -212452,7 +212452,7 @@ def index_omron_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_omron_get_serialize( + _param = self._index_okta_get_serialize( page=page, limit=limit, cursor=cursor, @@ -212484,7 +212484,7 @@ def index_omron_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOktaPaginatePagination", '404': "str", '500': "str", } @@ -212500,7 +212500,7 @@ def index_omron_get( @validate_call - def index_omron_get_with_http_info( + def index_okta_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -212538,10 +212538,10 @@ def index_omron_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination]: - """Return vulnerability data stored in index \"omron\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOktaPaginatePagination]: + """Return vulnerability data stored in index \"okta\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the omron index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Omron Vulnerability Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/omron?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/omron?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the okta index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Okta Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/okta?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/okta?cursor=` :param page: set the page number of the response :type page: int @@ -212613,7 +212613,7 @@ def index_omron_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_omron_get_serialize( + _param = self._index_okta_get_serialize( page=page, limit=limit, cursor=cursor, @@ -212645,7 +212645,7 @@ def index_omron_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOktaPaginatePagination", '404': "str", '500': "str", } @@ -212661,7 +212661,7 @@ def index_omron_get_with_http_info( @validate_call - def index_omron_get_without_preload_content( + def index_okta_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -212700,9 +212700,9 @@ def index_omron_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"omron\" + """Return vulnerability data stored in index \"okta\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the omron index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Omron Vulnerability Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/omron?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/omron?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the okta index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Okta Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/okta?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/okta?cursor=` :param page: set the page number of the response :type page: int @@ -212774,7 +212774,7 @@ def index_omron_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_omron_get_serialize( + _param = self._index_okta_get_serialize( page=page, limit=limit, cursor=cursor, @@ -212806,7 +212806,7 @@ def index_omron_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOktaPaginatePagination", '404': "str", '500': "str", } @@ -212817,7 +212817,7 @@ def index_omron_get_without_preload_content( return response_data.response - def _index_omron_get_serialize( + def _index_okta_get_serialize( self, page, limit, @@ -212985,7 +212985,7 @@ def _index_omron_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/omron', + resource_path='/v3/index/okta', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -213002,7 +213002,7 @@ def _index_omron_get_serialize( @validate_call - def index_one_e_get( + def index_omron_eol_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -213040,10 +213040,10 @@ def index_one_e_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination: - """Return vulnerability data stored in index \"one-e\" + ) -> RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination: + """Return vulnerability data stored in index \"omron-eol\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the one-e index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 1E Published Product Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/one-e?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/one-e?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the omron-eol index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Omron End of Life Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/omron-eol?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/omron-eol?cursor=` :param page: set the page number of the response :type page: int @@ -213115,7 +213115,7 @@ def index_one_e_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_one_e_get_serialize( + _param = self._index_omron_eol_get_serialize( page=page, limit=limit, cursor=cursor, @@ -213147,7 +213147,7 @@ def index_one_e_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination", '404': "str", '500': "str", } @@ -213163,7 +213163,7 @@ def index_one_e_get( @validate_call - def index_one_e_get_with_http_info( + def index_omron_eol_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -213201,10 +213201,10 @@ def index_one_e_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination]: - """Return vulnerability data stored in index \"one-e\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination]: + """Return vulnerability data stored in index \"omron-eol\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the one-e index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 1E Published Product Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/one-e?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/one-e?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the omron-eol index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Omron End of Life Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/omron-eol?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/omron-eol?cursor=` :param page: set the page number of the response :type page: int @@ -213276,7 +213276,7 @@ def index_one_e_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_one_e_get_serialize( + _param = self._index_omron_eol_get_serialize( page=page, limit=limit, cursor=cursor, @@ -213308,7 +213308,7 @@ def index_one_e_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination", '404': "str", '500': "str", } @@ -213324,7 +213324,7 @@ def index_one_e_get_with_http_info( @validate_call - def index_one_e_get_without_preload_content( + def index_omron_eol_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -213363,9 +213363,9 @@ def index_one_e_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"one-e\" + """Return vulnerability data stored in index \"omron-eol\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the one-e index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 1E Published Product Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/one-e?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/one-e?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the omron-eol index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Omron End of Life Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/omron-eol?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/omron-eol?cursor=` :param page: set the page number of the response :type page: int @@ -213437,7 +213437,7 @@ def index_one_e_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_one_e_get_serialize( + _param = self._index_omron_eol_get_serialize( page=page, limit=limit, cursor=cursor, @@ -213469,7 +213469,7 @@ def index_one_e_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryGenericEOLPaginatePagination", '404': "str", '500': "str", } @@ -213480,7 +213480,7 @@ def index_one_e_get_without_preload_content( return response_data.response - def _index_one_e_get_serialize( + def _index_omron_eol_get_serialize( self, page, limit, @@ -213648,7 +213648,7 @@ def _index_one_e_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/one-e', + resource_path='/v3/index/omron-eol', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -213665,7 +213665,7 @@ def _index_one_e_get_serialize( @validate_call - def index_opam_get( + def index_omron_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -213703,10 +213703,10 @@ def index_opam_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: - """Return vulnerability data stored in index \"opam\" + ) -> RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination: + """Return vulnerability data stored in index \"omron\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** opam (OCaml) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opam?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the omron index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Omron Vulnerability Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/omron?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/omron?cursor=` :param page: set the page number of the response :type page: int @@ -213778,7 +213778,7 @@ def index_opam_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_opam_get_serialize( + _param = self._index_omron_get_serialize( page=page, limit=limit, cursor=cursor, @@ -213810,7 +213810,7 @@ def index_opam_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination", '404': "str", '500': "str", } @@ -213826,7 +213826,7 @@ def index_opam_get( @validate_call - def index_opam_get_with_http_info( + def index_omron_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -213864,10 +213864,10 @@ def index_opam_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: - """Return vulnerability data stored in index \"opam\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination]: + """Return vulnerability data stored in index \"omron\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** opam (OCaml) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opam?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the omron index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Omron Vulnerability Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/omron?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/omron?cursor=` :param page: set the page number of the response :type page: int @@ -213939,7 +213939,7 @@ def index_opam_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_opam_get_serialize( + _param = self._index_omron_get_serialize( page=page, limit=limit, cursor=cursor, @@ -213971,7 +213971,7 @@ def index_opam_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination", '404': "str", '500': "str", } @@ -213987,7 +213987,7 @@ def index_opam_get_with_http_info( @validate_call - def index_opam_get_without_preload_content( + def index_omron_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -214026,9 +214026,9 @@ def index_opam_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"opam\" + """Return vulnerability data stored in index \"omron\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** opam (OCaml) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opam?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the omron index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Omron Vulnerability Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/omron?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/omron?cursor=` :param page: set the page number of the response :type page: int @@ -214100,7 +214100,7 @@ def index_opam_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_opam_get_serialize( + _param = self._index_omron_get_serialize( page=page, limit=limit, cursor=cursor, @@ -214132,7 +214132,7 @@ def index_opam_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination", '404': "str", '500': "str", } @@ -214143,7 +214143,7 @@ def index_opam_get_without_preload_content( return response_data.response - def _index_opam_get_serialize( + def _index_omron_get_serialize( self, page, limit, @@ -214311,7 +214311,7 @@ def _index_opam_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/opam', + resource_path='/v3/index/omron', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -214328,7 +214328,7 @@ def _index_opam_get_serialize( @validate_call - def index_open_cvdb_get( + def index_one_e_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -214366,10 +214366,10 @@ def index_open_cvdb_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination: - """Return vulnerability data stored in index \"open-cvdb\" + ) -> RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination: + """Return vulnerability data stored in index \"one-e\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the open-cvdb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** The Open Cloud Vulnerability & Security Issue Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/open-cvdb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/open-cvdb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the one-e index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 1E Published Product Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/one-e?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/one-e?cursor=` :param page: set the page number of the response :type page: int @@ -214441,7 +214441,7 @@ def index_open_cvdb_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_open_cvdb_get_serialize( + _param = self._index_one_e_get_serialize( page=page, limit=limit, cursor=cursor, @@ -214473,7 +214473,7 @@ def index_open_cvdb_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination", '404': "str", '500': "str", } @@ -214489,7 +214489,7 @@ def index_open_cvdb_get( @validate_call - def index_open_cvdb_get_with_http_info( + def index_one_e_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -214527,10 +214527,10 @@ def index_open_cvdb_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination]: - """Return vulnerability data stored in index \"open-cvdb\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination]: + """Return vulnerability data stored in index \"one-e\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the open-cvdb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** The Open Cloud Vulnerability & Security Issue Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/open-cvdb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/open-cvdb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the one-e index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 1E Published Product Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/one-e?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/one-e?cursor=` :param page: set the page number of the response :type page: int @@ -214602,7 +214602,7 @@ def index_open_cvdb_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_open_cvdb_get_serialize( + _param = self._index_one_e_get_serialize( page=page, limit=limit, cursor=cursor, @@ -214634,7 +214634,7 @@ def index_open_cvdb_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination", '404': "str", '500': "str", } @@ -214650,7 +214650,7 @@ def index_open_cvdb_get_with_http_info( @validate_call - def index_open_cvdb_get_without_preload_content( + def index_one_e_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -214689,9 +214689,9 @@ def index_open_cvdb_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"open-cvdb\" + """Return vulnerability data stored in index \"one-e\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the open-cvdb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** The Open Cloud Vulnerability & Security Issue Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/open-cvdb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/open-cvdb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the one-e index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** 1E Published Product Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/one-e?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/one-e?cursor=` :param page: set the page number of the response :type page: int @@ -214763,7 +214763,7 @@ def index_open_cvdb_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_open_cvdb_get_serialize( + _param = self._index_one_e_get_serialize( page=page, limit=limit, cursor=cursor, @@ -214795,7 +214795,7 @@ def index_open_cvdb_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination", '404': "str", '500': "str", } @@ -214806,7 +214806,7 @@ def index_open_cvdb_get_without_preload_content( return response_data.response - def _index_open_cvdb_get_serialize( + def _index_one_e_get_serialize( self, page, limit, @@ -214974,7 +214974,7 @@ def _index_open_cvdb_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/open-cvdb', + resource_path='/v3/index/one-e', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -214991,7 +214991,7 @@ def _index_open_cvdb_get_serialize( @validate_call - def index_openbsd_get( + def index_opam_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -215029,10 +215029,10 @@ def index_openbsd_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination: - """Return vulnerability data stored in index \"openbsd\" + ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: + """Return vulnerability data stored in index \"opam\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openbsd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenBSD Security Fixes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openbsd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openbsd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** opam (OCaml) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opam?cursor=` :param page: set the page number of the response :type page: int @@ -215104,7 +215104,7 @@ def index_openbsd_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openbsd_get_serialize( + _param = self._index_opam_get_serialize( page=page, limit=limit, cursor=cursor, @@ -215136,7 +215136,7 @@ def index_openbsd_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -215152,7 +215152,7 @@ def index_openbsd_get( @validate_call - def index_openbsd_get_with_http_info( + def index_opam_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -215190,10 +215190,10 @@ def index_openbsd_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination]: - """Return vulnerability data stored in index \"openbsd\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: + """Return vulnerability data stored in index \"opam\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openbsd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenBSD Security Fixes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openbsd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openbsd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** opam (OCaml) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opam?cursor=` :param page: set the page number of the response :type page: int @@ -215265,7 +215265,7 @@ def index_openbsd_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openbsd_get_serialize( + _param = self._index_opam_get_serialize( page=page, limit=limit, cursor=cursor, @@ -215297,7 +215297,7 @@ def index_openbsd_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -215313,7 +215313,7 @@ def index_openbsd_get_with_http_info( @validate_call - def index_openbsd_get_without_preload_content( + def index_opam_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -215352,9 +215352,9 @@ def index_openbsd_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"openbsd\" + """Return vulnerability data stored in index \"opam\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openbsd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenBSD Security Fixes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openbsd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openbsd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** opam (OCaml) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opam?cursor=` :param page: set the page number of the response :type page: int @@ -215426,7 +215426,7 @@ def index_openbsd_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openbsd_get_serialize( + _param = self._index_opam_get_serialize( page=page, limit=limit, cursor=cursor, @@ -215458,7 +215458,7 @@ def index_openbsd_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -215469,7 +215469,7 @@ def index_openbsd_get_without_preload_content( return response_data.response - def _index_openbsd_get_serialize( + def _index_opam_get_serialize( self, page, limit, @@ -215637,7 +215637,7 @@ def _index_openbsd_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/openbsd', + resource_path='/v3/index/opam', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -215654,7 +215654,7 @@ def _index_openbsd_get_serialize( @validate_call - def index_opengear_get( + def index_open_cvdb_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -215692,10 +215692,10 @@ def index_opengear_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination: - """Return vulnerability data stored in index \"opengear\" + ) -> RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination: + """Return vulnerability data stored in index \"open-cvdb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opengear index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Opengear Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opengear?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opengear?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the open-cvdb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** The Open Cloud Vulnerability & Security Issue Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/open-cvdb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/open-cvdb?cursor=` :param page: set the page number of the response :type page: int @@ -215767,7 +215767,7 @@ def index_opengear_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_opengear_get_serialize( + _param = self._index_open_cvdb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -215799,7 +215799,7 @@ def index_opengear_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination", '404': "str", '500': "str", } @@ -215815,7 +215815,7 @@ def index_opengear_get( @validate_call - def index_opengear_get_with_http_info( + def index_open_cvdb_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -215853,10 +215853,10 @@ def index_opengear_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination]: - """Return vulnerability data stored in index \"opengear\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination]: + """Return vulnerability data stored in index \"open-cvdb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opengear index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Opengear Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opengear?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opengear?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the open-cvdb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** The Open Cloud Vulnerability & Security Issue Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/open-cvdb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/open-cvdb?cursor=` :param page: set the page number of the response :type page: int @@ -215928,7 +215928,7 @@ def index_opengear_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_opengear_get_serialize( + _param = self._index_open_cvdb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -215960,7 +215960,7 @@ def index_opengear_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination", '404': "str", '500': "str", } @@ -215976,7 +215976,7 @@ def index_opengear_get_with_http_info( @validate_call - def index_opengear_get_without_preload_content( + def index_open_cvdb_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -216015,9 +216015,9 @@ def index_opengear_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"opengear\" + """Return vulnerability data stored in index \"open-cvdb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opengear index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Opengear Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opengear?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opengear?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the open-cvdb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** The Open Cloud Vulnerability & Security Issue Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/open-cvdb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/open-cvdb?cursor=` :param page: set the page number of the response :type page: int @@ -216089,7 +216089,7 @@ def index_opengear_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_opengear_get_serialize( + _param = self._index_open_cvdb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -216121,7 +216121,7 @@ def index_opengear_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination", '404': "str", '500': "str", } @@ -216132,7 +216132,7 @@ def index_opengear_get_without_preload_content( return response_data.response - def _index_opengear_get_serialize( + def _index_open_cvdb_get_serialize( self, page, limit, @@ -216300,7 +216300,7 @@ def _index_opengear_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/opengear', + resource_path='/v3/index/open-cvdb', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -216317,7 +216317,7 @@ def _index_opengear_get_serialize( @validate_call - def index_openjdk_get( + def index_openbsd_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -216355,10 +216355,10 @@ def index_openjdk_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination: - """Return vulnerability data stored in index \"openjdk\" + ) -> RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination: + """Return vulnerability data stored in index \"openbsd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openjdk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenJDK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openjdk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openjdk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openbsd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenBSD Security Fixes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openbsd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openbsd?cursor=` :param page: set the page number of the response :type page: int @@ -216430,7 +216430,7 @@ def index_openjdk_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openjdk_get_serialize( + _param = self._index_openbsd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -216462,7 +216462,7 @@ def index_openjdk_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination", '404': "str", '500': "str", } @@ -216478,7 +216478,7 @@ def index_openjdk_get( @validate_call - def index_openjdk_get_with_http_info( + def index_openbsd_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -216516,10 +216516,10 @@ def index_openjdk_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination]: - """Return vulnerability data stored in index \"openjdk\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination]: + """Return vulnerability data stored in index \"openbsd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openjdk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenJDK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openjdk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openjdk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openbsd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenBSD Security Fixes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openbsd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openbsd?cursor=` :param page: set the page number of the response :type page: int @@ -216591,7 +216591,7 @@ def index_openjdk_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openjdk_get_serialize( + _param = self._index_openbsd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -216623,7 +216623,7 @@ def index_openjdk_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination", '404': "str", '500': "str", } @@ -216639,7 +216639,7 @@ def index_openjdk_get_with_http_info( @validate_call - def index_openjdk_get_without_preload_content( + def index_openbsd_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -216678,9 +216678,9 @@ def index_openjdk_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"openjdk\" + """Return vulnerability data stored in index \"openbsd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openjdk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenJDK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openjdk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openjdk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openbsd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenBSD Security Fixes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openbsd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openbsd?cursor=` :param page: set the page number of the response :type page: int @@ -216752,7 +216752,7 @@ def index_openjdk_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openjdk_get_serialize( + _param = self._index_openbsd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -216784,7 +216784,7 @@ def index_openjdk_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination", '404': "str", '500': "str", } @@ -216795,7 +216795,7 @@ def index_openjdk_get_without_preload_content( return response_data.response - def _index_openjdk_get_serialize( + def _index_openbsd_get_serialize( self, page, limit, @@ -216963,7 +216963,7 @@ def _index_openjdk_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/openjdk', + resource_path='/v3/index/openbsd', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -216980,7 +216980,7 @@ def _index_openjdk_get_serialize( @validate_call - def index_openssh_get( + def index_opengear_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -217018,10 +217018,10 @@ def index_openssh_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination: - """Return vulnerability data stored in index \"openssh\" + ) -> RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination: + """Return vulnerability data stored in index \"opengear\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssh index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSH Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssh?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssh?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opengear index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Opengear Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opengear?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opengear?cursor=` :param page: set the page number of the response :type page: int @@ -217093,7 +217093,7 @@ def index_openssh_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openssh_get_serialize( + _param = self._index_opengear_get_serialize( page=page, limit=limit, cursor=cursor, @@ -217125,7 +217125,7 @@ def index_openssh_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination", '404': "str", '500': "str", } @@ -217141,7 +217141,7 @@ def index_openssh_get( @validate_call - def index_openssh_get_with_http_info( + def index_opengear_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -217179,10 +217179,10 @@ def index_openssh_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination]: - """Return vulnerability data stored in index \"openssh\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination]: + """Return vulnerability data stored in index \"opengear\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssh index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSH Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssh?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssh?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opengear index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Opengear Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opengear?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opengear?cursor=` :param page: set the page number of the response :type page: int @@ -217254,7 +217254,7 @@ def index_openssh_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openssh_get_serialize( + _param = self._index_opengear_get_serialize( page=page, limit=limit, cursor=cursor, @@ -217286,7 +217286,7 @@ def index_openssh_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination", '404': "str", '500': "str", } @@ -217302,7 +217302,7 @@ def index_openssh_get_with_http_info( @validate_call - def index_openssh_get_without_preload_content( + def index_opengear_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -217341,9 +217341,9 @@ def index_openssh_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"openssh\" + """Return vulnerability data stored in index \"opengear\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssh index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSH Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssh?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssh?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the opengear index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Opengear Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/opengear?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/opengear?cursor=` :param page: set the page number of the response :type page: int @@ -217415,7 +217415,7 @@ def index_openssh_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openssh_get_serialize( + _param = self._index_opengear_get_serialize( page=page, limit=limit, cursor=cursor, @@ -217447,7 +217447,7 @@ def index_openssh_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination", '404': "str", '500': "str", } @@ -217458,7 +217458,7 @@ def index_openssh_get_without_preload_content( return response_data.response - def _index_openssh_get_serialize( + def _index_opengear_get_serialize( self, page, limit, @@ -217626,7 +217626,7 @@ def _index_openssh_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/openssh', + resource_path='/v3/index/opengear', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -217643,7 +217643,7 @@ def _index_openssh_get_serialize( @validate_call - def index_openssl_secadv_get( + def index_openjdk_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -217681,10 +217681,10 @@ def index_openssl_secadv_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination: - """Return vulnerability data stored in index \"openssl-secadv\" + ) -> RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination: + """Return vulnerability data stored in index \"openjdk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssl-secadv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSL Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssl-secadv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssl-secadv?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openjdk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenJDK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openjdk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openjdk?cursor=` :param page: set the page number of the response :type page: int @@ -217756,7 +217756,7 @@ def index_openssl_secadv_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openssl_secadv_get_serialize( + _param = self._index_openjdk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -217788,7 +217788,7 @@ def index_openssl_secadv_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination", '404': "str", '500': "str", } @@ -217804,7 +217804,7 @@ def index_openssl_secadv_get( @validate_call - def index_openssl_secadv_get_with_http_info( + def index_openjdk_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -217842,10 +217842,10 @@ def index_openssl_secadv_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination]: - """Return vulnerability data stored in index \"openssl-secadv\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination]: + """Return vulnerability data stored in index \"openjdk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssl-secadv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSL Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssl-secadv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssl-secadv?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openjdk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenJDK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openjdk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openjdk?cursor=` :param page: set the page number of the response :type page: int @@ -217917,7 +217917,7 @@ def index_openssl_secadv_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openssl_secadv_get_serialize( + _param = self._index_openjdk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -217949,7 +217949,7 @@ def index_openssl_secadv_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination", '404': "str", '500': "str", } @@ -217965,7 +217965,7 @@ def index_openssl_secadv_get_with_http_info( @validate_call - def index_openssl_secadv_get_without_preload_content( + def index_openjdk_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -218004,9 +218004,9 @@ def index_openssl_secadv_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"openssl-secadv\" + """Return vulnerability data stored in index \"openjdk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssl-secadv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSL Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssl-secadv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssl-secadv?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openjdk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenJDK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openjdk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openjdk?cursor=` :param page: set the page number of the response :type page: int @@ -218078,7 +218078,7 @@ def index_openssl_secadv_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openssl_secadv_get_serialize( + _param = self._index_openjdk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -218110,7 +218110,7 @@ def index_openssl_secadv_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination", '404': "str", '500': "str", } @@ -218121,7 +218121,7 @@ def index_openssl_secadv_get_without_preload_content( return response_data.response - def _index_openssl_secadv_get_serialize( + def _index_openjdk_get_serialize( self, page, limit, @@ -218289,7 +218289,7 @@ def _index_openssl_secadv_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/openssl-secadv', + resource_path='/v3/index/openjdk', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -218306,7 +218306,7 @@ def _index_openssl_secadv_get_serialize( @validate_call - def index_openstack_get( + def index_openssh_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -218344,10 +218344,10 @@ def index_openstack_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination: - """Return vulnerability data stored in index \"openstack\" + ) -> RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination: + """Return vulnerability data stored in index \"openssh\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openstack index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenStack Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openstack?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openstack?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssh index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSH Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssh?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssh?cursor=` :param page: set the page number of the response :type page: int @@ -218419,7 +218419,7 @@ def index_openstack_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openstack_get_serialize( + _param = self._index_openssh_get_serialize( page=page, limit=limit, cursor=cursor, @@ -218451,7 +218451,7 @@ def index_openstack_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination", '404': "str", '500': "str", } @@ -218467,7 +218467,7 @@ def index_openstack_get( @validate_call - def index_openstack_get_with_http_info( + def index_openssh_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -218505,10 +218505,10 @@ def index_openstack_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination]: - """Return vulnerability data stored in index \"openstack\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination]: + """Return vulnerability data stored in index \"openssh\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openstack index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenStack Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openstack?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openstack?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssh index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSH Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssh?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssh?cursor=` :param page: set the page number of the response :type page: int @@ -218580,7 +218580,7 @@ def index_openstack_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openstack_get_serialize( + _param = self._index_openssh_get_serialize( page=page, limit=limit, cursor=cursor, @@ -218612,7 +218612,7 @@ def index_openstack_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination", '404': "str", '500': "str", } @@ -218628,7 +218628,7 @@ def index_openstack_get_with_http_info( @validate_call - def index_openstack_get_without_preload_content( + def index_openssh_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -218667,9 +218667,9 @@ def index_openstack_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"openstack\" + """Return vulnerability data stored in index \"openssh\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openstack index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenStack Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openstack?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openstack?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssh index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSH Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssh?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssh?cursor=` :param page: set the page number of the response :type page: int @@ -218741,7 +218741,7 @@ def index_openstack_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openstack_get_serialize( + _param = self._index_openssh_get_serialize( page=page, limit=limit, cursor=cursor, @@ -218773,7 +218773,7 @@ def index_openstack_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination", '404': "str", '500': "str", } @@ -218784,7 +218784,7 @@ def index_openstack_get_without_preload_content( return response_data.response - def _index_openstack_get_serialize( + def _index_openssh_get_serialize( self, page, limit, @@ -218952,7 +218952,7 @@ def _index_openstack_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/openstack', + resource_path='/v3/index/openssh', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -218969,7 +218969,7 @@ def _index_openstack_get_serialize( @validate_call - def index_openwrt_get( + def index_openssl_secadv_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -219007,10 +219007,10 @@ def index_openwrt_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination: - """Return vulnerability data stored in index \"openwrt\" + ) -> RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination: + """Return vulnerability data stored in index \"openssl-secadv\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openwrt index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenWrt Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openwrt?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openwrt?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssl-secadv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSL Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssl-secadv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssl-secadv?cursor=` :param page: set the page number of the response :type page: int @@ -219082,7 +219082,7 @@ def index_openwrt_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openwrt_get_serialize( + _param = self._index_openssl_secadv_get_serialize( page=page, limit=limit, cursor=cursor, @@ -219114,7 +219114,7 @@ def index_openwrt_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination", '404': "str", '500': "str", } @@ -219130,7 +219130,7 @@ def index_openwrt_get( @validate_call - def index_openwrt_get_with_http_info( + def index_openssl_secadv_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -219168,10 +219168,10 @@ def index_openwrt_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination]: - """Return vulnerability data stored in index \"openwrt\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination]: + """Return vulnerability data stored in index \"openssl-secadv\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openwrt index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenWrt Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openwrt?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openwrt?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssl-secadv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSL Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssl-secadv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssl-secadv?cursor=` :param page: set the page number of the response :type page: int @@ -219243,7 +219243,7 @@ def index_openwrt_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openwrt_get_serialize( + _param = self._index_openssl_secadv_get_serialize( page=page, limit=limit, cursor=cursor, @@ -219275,7 +219275,7 @@ def index_openwrt_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination", '404': "str", '500': "str", } @@ -219291,7 +219291,7 @@ def index_openwrt_get_with_http_info( @validate_call - def index_openwrt_get_without_preload_content( + def index_openssl_secadv_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -219330,9 +219330,9 @@ def index_openwrt_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"openwrt\" + """Return vulnerability data stored in index \"openssl-secadv\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openwrt index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenWrt Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openwrt?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openwrt?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openssl-secadv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenSSL Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openssl-secadv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openssl-secadv?cursor=` :param page: set the page number of the response :type page: int @@ -219404,7 +219404,7 @@ def index_openwrt_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_openwrt_get_serialize( + _param = self._index_openssl_secadv_get_serialize( page=page, limit=limit, cursor=cursor, @@ -219436,7 +219436,7 @@ def index_openwrt_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination", '404': "str", '500': "str", } @@ -219447,7 +219447,7 @@ def index_openwrt_get_without_preload_content( return response_data.response - def _index_openwrt_get_serialize( + def _index_openssl_secadv_get_serialize( self, page, limit, @@ -219615,7 +219615,7 @@ def _index_openwrt_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/openwrt', + resource_path='/v3/index/openssl-secadv', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -219632,7 +219632,7 @@ def _index_openwrt_get_serialize( @validate_call - def index_oracle_cpu_csaf_get( + def index_openstack_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -219670,10 +219670,10 @@ def index_oracle_cpu_csaf_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination: - """Return vulnerability data stored in index \"oracle-cpu-csaf\" + ) -> RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination: + """Return vulnerability data stored in index \"openstack\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu-csaf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Updates CSAF ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu-csaf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu-csaf?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openstack index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenStack Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openstack?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openstack?cursor=` :param page: set the page number of the response :type page: int @@ -219745,7 +219745,7 @@ def index_oracle_cpu_csaf_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_oracle_cpu_csaf_get_serialize( + _param = self._index_openstack_get_serialize( page=page, limit=limit, cursor=cursor, @@ -219777,7 +219777,7 @@ def index_oracle_cpu_csaf_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination", '404': "str", '500': "str", } @@ -219793,7 +219793,7 @@ def index_oracle_cpu_csaf_get( @validate_call - def index_oracle_cpu_csaf_get_with_http_info( + def index_openstack_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -219831,10 +219831,10 @@ def index_oracle_cpu_csaf_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination]: - """Return vulnerability data stored in index \"oracle-cpu-csaf\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination]: + """Return vulnerability data stored in index \"openstack\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu-csaf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Updates CSAF ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu-csaf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu-csaf?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openstack index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenStack Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openstack?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openstack?cursor=` :param page: set the page number of the response :type page: int @@ -219906,7 +219906,7 @@ def index_oracle_cpu_csaf_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_oracle_cpu_csaf_get_serialize( + _param = self._index_openstack_get_serialize( page=page, limit=limit, cursor=cursor, @@ -219938,7 +219938,7 @@ def index_oracle_cpu_csaf_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination", '404': "str", '500': "str", } @@ -219954,7 +219954,7 @@ def index_oracle_cpu_csaf_get_with_http_info( @validate_call - def index_oracle_cpu_csaf_get_without_preload_content( + def index_openstack_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -219993,9 +219993,9 @@ def index_oracle_cpu_csaf_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"oracle-cpu-csaf\" + """Return vulnerability data stored in index \"openstack\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu-csaf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Updates CSAF ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu-csaf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu-csaf?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openstack index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenStack Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openstack?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openstack?cursor=` :param page: set the page number of the response :type page: int @@ -220067,7 +220067,7 @@ def index_oracle_cpu_csaf_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_oracle_cpu_csaf_get_serialize( + _param = self._index_openstack_get_serialize( page=page, limit=limit, cursor=cursor, @@ -220099,7 +220099,7 @@ def index_oracle_cpu_csaf_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination", '404': "str", '500': "str", } @@ -220110,7 +220110,7 @@ def index_oracle_cpu_csaf_get_without_preload_content( return response_data.response - def _index_oracle_cpu_csaf_get_serialize( + def _index_openstack_get_serialize( self, page, limit, @@ -220278,7 +220278,7 @@ def _index_oracle_cpu_csaf_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/oracle-cpu-csaf', + resource_path='/v3/index/openstack', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -220295,7 +220295,7 @@ def _index_oracle_cpu_csaf_get_serialize( @validate_call - def index_oracle_cpu_get( + def index_openwrt_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -220333,10 +220333,10 @@ def index_oracle_cpu_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination: - """Return vulnerability data stored in index \"oracle-cpu\" + ) -> RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination: + """Return vulnerability data stored in index \"openwrt\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Update Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openwrt index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenWrt Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openwrt?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openwrt?cursor=` :param page: set the page number of the response :type page: int @@ -220408,7 +220408,7 @@ def index_oracle_cpu_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_oracle_cpu_get_serialize( + _param = self._index_openwrt_get_serialize( page=page, limit=limit, cursor=cursor, @@ -220440,7 +220440,7 @@ def index_oracle_cpu_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination", '404': "str", '500': "str", } @@ -220456,7 +220456,7 @@ def index_oracle_cpu_get( @validate_call - def index_oracle_cpu_get_with_http_info( + def index_openwrt_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -220494,10 +220494,10 @@ def index_oracle_cpu_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination]: - """Return vulnerability data stored in index \"oracle-cpu\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination]: + """Return vulnerability data stored in index \"openwrt\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Update Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openwrt index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenWrt Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openwrt?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openwrt?cursor=` :param page: set the page number of the response :type page: int @@ -220569,7 +220569,7 @@ def index_oracle_cpu_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_oracle_cpu_get_serialize( + _param = self._index_openwrt_get_serialize( page=page, limit=limit, cursor=cursor, @@ -220601,7 +220601,7 @@ def index_oracle_cpu_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination", '404': "str", '500': "str", } @@ -220617,7 +220617,7 @@ def index_oracle_cpu_get_with_http_info( @validate_call - def index_oracle_cpu_get_without_preload_content( + def index_openwrt_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -220656,9 +220656,9 @@ def index_oracle_cpu_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"oracle-cpu\" + """Return vulnerability data stored in index \"openwrt\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Update Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the openwrt index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OpenWrt Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/openwrt?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/openwrt?cursor=` :param page: set the page number of the response :type page: int @@ -220730,7 +220730,7 @@ def index_oracle_cpu_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_oracle_cpu_get_serialize( + _param = self._index_openwrt_get_serialize( page=page, limit=limit, cursor=cursor, @@ -220762,7 +220762,7 @@ def index_oracle_cpu_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination", '404': "str", '500': "str", } @@ -220773,7 +220773,7 @@ def index_oracle_cpu_get_without_preload_content( return response_data.response - def _index_oracle_cpu_get_serialize( + def _index_openwrt_get_serialize( self, page, limit, @@ -220941,7 +220941,7 @@ def _index_oracle_cpu_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/oracle-cpu', + resource_path='/v3/index/openwrt', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -220958,7 +220958,7 @@ def _index_oracle_cpu_get_serialize( @validate_call - def index_oracle_get( + def index_oracle_cpu_csaf_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -220996,10 +220996,10 @@ def index_oracle_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination: - """Return vulnerability data stored in index \"oracle\" + ) -> RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination: + """Return vulnerability data stored in index \"oracle-cpu-csaf\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu-csaf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Updates CSAF ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu-csaf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu-csaf?cursor=` :param page: set the page number of the response :type page: int @@ -221071,7 +221071,7 @@ def index_oracle_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_oracle_get_serialize( + _param = self._index_oracle_cpu_csaf_get_serialize( page=page, limit=limit, cursor=cursor, @@ -221103,7 +221103,7 @@ def index_oracle_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination", '404': "str", '500': "str", } @@ -221119,7 +221119,7 @@ def index_oracle_get( @validate_call - def index_oracle_get_with_http_info( + def index_oracle_cpu_csaf_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -221157,10 +221157,10 @@ def index_oracle_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination]: - """Return vulnerability data stored in index \"oracle\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination]: + """Return vulnerability data stored in index \"oracle-cpu-csaf\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu-csaf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Updates CSAF ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu-csaf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu-csaf?cursor=` :param page: set the page number of the response :type page: int @@ -221232,7 +221232,7 @@ def index_oracle_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_oracle_get_serialize( + _param = self._index_oracle_cpu_csaf_get_serialize( page=page, limit=limit, cursor=cursor, @@ -221264,7 +221264,7 @@ def index_oracle_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination", '404': "str", '500': "str", } @@ -221280,7 +221280,7 @@ def index_oracle_get_with_http_info( @validate_call - def index_oracle_get_without_preload_content( + def index_oracle_cpu_csaf_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -221319,9 +221319,9 @@ def index_oracle_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"oracle\" + """Return vulnerability data stored in index \"oracle-cpu-csaf\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu-csaf index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Updates CSAF ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu-csaf?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu-csaf?cursor=` :param page: set the page number of the response :type page: int @@ -221393,7 +221393,7 @@ def index_oracle_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_oracle_get_serialize( + _param = self._index_oracle_cpu_csaf_get_serialize( page=page, limit=limit, cursor=cursor, @@ -221425,7 +221425,7 @@ def index_oracle_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination", '404': "str", '500': "str", } @@ -221436,7 +221436,7 @@ def index_oracle_get_without_preload_content( return response_data.response - def _index_oracle_get_serialize( + def _index_oracle_cpu_csaf_get_serialize( self, page, limit, @@ -221604,7 +221604,7 @@ def _index_oracle_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/oracle', + resource_path='/v3/index/oracle-cpu-csaf', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -221621,7 +221621,7 @@ def _index_oracle_get_serialize( @validate_call - def index_osv_get( + def index_oracle_cpu_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -221659,10 +221659,10 @@ def index_osv_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination: - """Return vulnerability data stored in index \"osv\" + ) -> RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination: + """Return vulnerability data stored in index \"oracle-cpu\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the osv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Open Source Vulnerabilities Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/osv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/osv?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Update Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu?cursor=` :param page: set the page number of the response :type page: int @@ -221734,7 +221734,7 @@ def index_osv_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_osv_get_serialize( + _param = self._index_oracle_cpu_get_serialize( page=page, limit=limit, cursor=cursor, @@ -221766,7 +221766,7 @@ def index_osv_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination", '404': "str", '500': "str", } @@ -221782,7 +221782,7 @@ def index_osv_get( @validate_call - def index_osv_get_with_http_info( + def index_oracle_cpu_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -221820,10 +221820,10 @@ def index_osv_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination]: - """Return vulnerability data stored in index \"osv\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination]: + """Return vulnerability data stored in index \"oracle-cpu\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the osv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Open Source Vulnerabilities Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/osv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/osv?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Update Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu?cursor=` :param page: set the page number of the response :type page: int @@ -221895,7 +221895,7 @@ def index_osv_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_osv_get_serialize( + _param = self._index_oracle_cpu_get_serialize( page=page, limit=limit, cursor=cursor, @@ -221927,7 +221927,7 @@ def index_osv_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination", '404': "str", '500': "str", } @@ -221943,7 +221943,7 @@ def index_osv_get_with_http_info( @validate_call - def index_osv_get_without_preload_content( + def index_oracle_cpu_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -221982,9 +221982,9 @@ def index_osv_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"osv\" + """Return vulnerability data stored in index \"oracle-cpu\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the osv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Open Source Vulnerabilities Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/osv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/osv?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Critical Patch Update Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle-cpu?cursor=` :param page: set the page number of the response :type page: int @@ -222056,7 +222056,7 @@ def index_osv_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_osv_get_serialize( + _param = self._index_oracle_cpu_get_serialize( page=page, limit=limit, cursor=cursor, @@ -222088,7 +222088,7 @@ def index_osv_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination", '404': "str", '500': "str", } @@ -222099,7 +222099,7 @@ def index_osv_get_without_preload_content( return response_data.response - def _index_osv_get_serialize( + def _index_oracle_cpu_get_serialize( self, page, limit, @@ -222267,7 +222267,7 @@ def _index_osv_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/osv', + resource_path='/v3/index/oracle-cpu', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -222284,7 +222284,7 @@ def _index_osv_get_serialize( @validate_call - def index_otrs_get( + def index_oracle_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -222322,10 +222322,10 @@ def index_otrs_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination: - """Return vulnerability data stored in index \"otrs\" + ) -> RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination: + """Return vulnerability data stored in index \"oracle\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the otrs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OTRS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/otrs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/otrs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle?cursor=` :param page: set the page number of the response :type page: int @@ -222397,7 +222397,7 @@ def index_otrs_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_otrs_get_serialize( + _param = self._index_oracle_get_serialize( page=page, limit=limit, cursor=cursor, @@ -222429,7 +222429,7 @@ def index_otrs_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination", '404': "str", '500': "str", } @@ -222445,7 +222445,7 @@ def index_otrs_get( @validate_call - def index_otrs_get_with_http_info( + def index_oracle_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -222483,10 +222483,10 @@ def index_otrs_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination]: - """Return vulnerability data stored in index \"otrs\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination]: + """Return vulnerability data stored in index \"oracle\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the otrs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OTRS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/otrs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/otrs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle?cursor=` :param page: set the page number of the response :type page: int @@ -222558,7 +222558,7 @@ def index_otrs_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_otrs_get_serialize( + _param = self._index_oracle_get_serialize( page=page, limit=limit, cursor=cursor, @@ -222590,7 +222590,7 @@ def index_otrs_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination", '404': "str", '500': "str", } @@ -222606,7 +222606,7 @@ def index_otrs_get_with_http_info( @validate_call - def index_otrs_get_without_preload_content( + def index_oracle_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -222645,9 +222645,9 @@ def index_otrs_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"otrs\" + """Return vulnerability data stored in index \"oracle\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the otrs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OTRS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/otrs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/otrs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the oracle index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Oracle Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/oracle?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/oracle?cursor=` :param page: set the page number of the response :type page: int @@ -222719,7 +222719,7 @@ def index_otrs_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_otrs_get_serialize( + _param = self._index_oracle_get_serialize( page=page, limit=limit, cursor=cursor, @@ -222751,7 +222751,7 @@ def index_otrs_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination", '404': "str", '500': "str", } @@ -222762,7 +222762,7 @@ def index_otrs_get_without_preload_content( return response_data.response - def _index_otrs_get_serialize( + def _index_oracle_get_serialize( self, page, limit, @@ -222930,7 +222930,7 @@ def _index_otrs_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/otrs', + resource_path='/v3/index/oracle', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -222947,7 +222947,7 @@ def _index_otrs_get_serialize( @validate_call - def index_owncloud_get( + def index_osv_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -222985,10 +222985,10 @@ def index_owncloud_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination: - """Return vulnerability data stored in index \"owncloud\" + ) -> RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination: + """Return vulnerability data stored in index \"osv\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the owncloud index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OwnCloud Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/owncloud?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/owncloud?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the osv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Open Source Vulnerabilities Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/osv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/osv?cursor=` :param page: set the page number of the response :type page: int @@ -223060,7 +223060,7 @@ def index_owncloud_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_owncloud_get_serialize( + _param = self._index_osv_get_serialize( page=page, limit=limit, cursor=cursor, @@ -223092,7 +223092,7 @@ def index_owncloud_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination", '404': "str", '500': "str", } @@ -223108,7 +223108,7 @@ def index_owncloud_get( @validate_call - def index_owncloud_get_with_http_info( + def index_osv_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -223146,10 +223146,10 @@ def index_owncloud_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination]: - """Return vulnerability data stored in index \"owncloud\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination]: + """Return vulnerability data stored in index \"osv\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the owncloud index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OwnCloud Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/owncloud?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/owncloud?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the osv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Open Source Vulnerabilities Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/osv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/osv?cursor=` :param page: set the page number of the response :type page: int @@ -223221,7 +223221,7 @@ def index_owncloud_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_owncloud_get_serialize( + _param = self._index_osv_get_serialize( page=page, limit=limit, cursor=cursor, @@ -223253,7 +223253,7 @@ def index_owncloud_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination", '404': "str", '500': "str", } @@ -223269,7 +223269,7 @@ def index_owncloud_get_with_http_info( @validate_call - def index_owncloud_get_without_preload_content( + def index_osv_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -223308,9 +223308,9 @@ def index_owncloud_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"owncloud\" + """Return vulnerability data stored in index \"osv\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the owncloud index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OwnCloud Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/owncloud?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/owncloud?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the osv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Open Source Vulnerabilities Database ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/osv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/osv?cursor=` :param page: set the page number of the response :type page: int @@ -223382,7 +223382,7 @@ def index_owncloud_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_owncloud_get_serialize( + _param = self._index_osv_get_serialize( page=page, limit=limit, cursor=cursor, @@ -223414,7 +223414,7 @@ def index_owncloud_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination", '404': "str", '500': "str", } @@ -223425,7 +223425,7 @@ def index_owncloud_get_without_preload_content( return response_data.response - def _index_owncloud_get_serialize( + def _index_osv_get_serialize( self, page, limit, @@ -223593,7 +223593,7 @@ def _index_owncloud_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/owncloud', + resource_path='/v3/index/osv', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -223610,7 +223610,7 @@ def _index_owncloud_get_serialize( @validate_call - def index_packetstorm_get( + def index_otrs_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -223648,10 +223648,10 @@ def index_packetstorm_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination: - """Return vulnerability data stored in index \"packetstorm\" + ) -> RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination: + """Return vulnerability data stored in index \"otrs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the packetstorm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PacketStorm ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/packetstorm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/packetstorm?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the otrs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OTRS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/otrs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/otrs?cursor=` :param page: set the page number of the response :type page: int @@ -223723,7 +223723,7 @@ def index_packetstorm_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_packetstorm_get_serialize( + _param = self._index_otrs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -223755,7 +223755,7 @@ def index_packetstorm_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination", '404': "str", '500': "str", } @@ -223771,7 +223771,7 @@ def index_packetstorm_get( @validate_call - def index_packetstorm_get_with_http_info( + def index_otrs_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -223809,10 +223809,10 @@ def index_packetstorm_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination]: - """Return vulnerability data stored in index \"packetstorm\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination]: + """Return vulnerability data stored in index \"otrs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the packetstorm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PacketStorm ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/packetstorm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/packetstorm?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the otrs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OTRS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/otrs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/otrs?cursor=` :param page: set the page number of the response :type page: int @@ -223884,7 +223884,7 @@ def index_packetstorm_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_packetstorm_get_serialize( + _param = self._index_otrs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -223916,7 +223916,7 @@ def index_packetstorm_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination", '404': "str", '500': "str", } @@ -223932,7 +223932,7 @@ def index_packetstorm_get_with_http_info( @validate_call - def index_packetstorm_get_without_preload_content( + def index_otrs_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -223971,9 +223971,9 @@ def index_packetstorm_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"packetstorm\" + """Return vulnerability data stored in index \"otrs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the packetstorm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PacketStorm ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/packetstorm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/packetstorm?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the otrs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OTRS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/otrs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/otrs?cursor=` :param page: set the page number of the response :type page: int @@ -224045,7 +224045,7 @@ def index_packetstorm_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_packetstorm_get_serialize( + _param = self._index_otrs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -224077,7 +224077,7 @@ def index_packetstorm_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination", '404': "str", '500': "str", } @@ -224088,7 +224088,7 @@ def index_packetstorm_get_without_preload_content( return response_data.response - def _index_packetstorm_get_serialize( + def _index_otrs_get_serialize( self, page, limit, @@ -224256,7 +224256,7 @@ def _index_packetstorm_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/packetstorm', + resource_path='/v3/index/otrs', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -224273,7 +224273,7 @@ def _index_packetstorm_get_serialize( @validate_call - def index_palantir_get( + def index_owncloud_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -224311,10 +224311,10 @@ def index_palantir_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination: - """Return vulnerability data stored in index \"palantir\" + ) -> RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination: + """Return vulnerability data stored in index \"owncloud\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palantir index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palantir Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palantir?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palantir?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the owncloud index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OwnCloud Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/owncloud?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/owncloud?cursor=` :param page: set the page number of the response :type page: int @@ -224386,7 +224386,7 @@ def index_palantir_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_palantir_get_serialize( + _param = self._index_owncloud_get_serialize( page=page, limit=limit, cursor=cursor, @@ -224418,7 +224418,7 @@ def index_palantir_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination", '404': "str", '500': "str", } @@ -224434,7 +224434,7 @@ def index_palantir_get( @validate_call - def index_palantir_get_with_http_info( + def index_owncloud_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -224472,10 +224472,10 @@ def index_palantir_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination]: - """Return vulnerability data stored in index \"palantir\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination]: + """Return vulnerability data stored in index \"owncloud\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palantir index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palantir Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palantir?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palantir?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the owncloud index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OwnCloud Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/owncloud?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/owncloud?cursor=` :param page: set the page number of the response :type page: int @@ -224547,7 +224547,7 @@ def index_palantir_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_palantir_get_serialize( + _param = self._index_owncloud_get_serialize( page=page, limit=limit, cursor=cursor, @@ -224579,7 +224579,7 @@ def index_palantir_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination", '404': "str", '500': "str", } @@ -224595,7 +224595,7 @@ def index_palantir_get_with_http_info( @validate_call - def index_palantir_get_without_preload_content( + def index_owncloud_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -224634,9 +224634,9 @@ def index_palantir_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"palantir\" + """Return vulnerability data stored in index \"owncloud\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palantir index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palantir Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palantir?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palantir?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the owncloud index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** OwnCloud Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/owncloud?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/owncloud?cursor=` :param page: set the page number of the response :type page: int @@ -224708,7 +224708,7 @@ def index_palantir_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_palantir_get_serialize( + _param = self._index_owncloud_get_serialize( page=page, limit=limit, cursor=cursor, @@ -224740,7 +224740,7 @@ def index_palantir_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination", '404': "str", '500': "str", } @@ -224751,7 +224751,7 @@ def index_palantir_get_without_preload_content( return response_data.response - def _index_palantir_get_serialize( + def _index_owncloud_get_serialize( self, page, limit, @@ -224919,7 +224919,7 @@ def _index_palantir_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/palantir', + resource_path='/v3/index/owncloud', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -224936,7 +224936,7 @@ def _index_palantir_get_serialize( @validate_call - def index_palo_alto_get( + def index_packetstorm_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -224974,10 +224974,10 @@ def index_palo_alto_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"palo-alto\" + ) -> RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination: + """Return vulnerability data stored in index \"packetstorm\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palo-alto index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palo Alto Networks Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palo-alto?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palo-alto?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the packetstorm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PacketStorm ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/packetstorm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/packetstorm?cursor=` :param page: set the page number of the response :type page: int @@ -225049,7 +225049,7 @@ def index_palo_alto_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_palo_alto_get_serialize( + _param = self._index_packetstorm_get_serialize( page=page, limit=limit, cursor=cursor, @@ -225081,7 +225081,7 @@ def index_palo_alto_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination", '404': "str", '500': "str", } @@ -225097,7 +225097,7 @@ def index_palo_alto_get( @validate_call - def index_palo_alto_get_with_http_info( + def index_packetstorm_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -225135,10 +225135,10 @@ def index_palo_alto_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"palo-alto\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination]: + """Return vulnerability data stored in index \"packetstorm\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palo-alto index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palo Alto Networks Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palo-alto?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palo-alto?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the packetstorm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PacketStorm ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/packetstorm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/packetstorm?cursor=` :param page: set the page number of the response :type page: int @@ -225210,7 +225210,7 @@ def index_palo_alto_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_palo_alto_get_serialize( + _param = self._index_packetstorm_get_serialize( page=page, limit=limit, cursor=cursor, @@ -225242,7 +225242,7 @@ def index_palo_alto_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination", '404': "str", '500': "str", } @@ -225258,7 +225258,7 @@ def index_palo_alto_get_with_http_info( @validate_call - def index_palo_alto_get_without_preload_content( + def index_packetstorm_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -225297,9 +225297,9 @@ def index_palo_alto_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"palo-alto\" + """Return vulnerability data stored in index \"packetstorm\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palo-alto index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palo Alto Networks Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palo-alto?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palo-alto?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the packetstorm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PacketStorm ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/packetstorm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/packetstorm?cursor=` :param page: set the page number of the response :type page: int @@ -225371,7 +225371,7 @@ def index_palo_alto_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_palo_alto_get_serialize( + _param = self._index_packetstorm_get_serialize( page=page, limit=limit, cursor=cursor, @@ -225403,7 +225403,7 @@ def index_palo_alto_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination", '404': "str", '500': "str", } @@ -225414,7 +225414,7 @@ def index_palo_alto_get_without_preload_content( return response_data.response - def _index_palo_alto_get_serialize( + def _index_packetstorm_get_serialize( self, page, limit, @@ -225582,7 +225582,7 @@ def _index_palo_alto_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/palo-alto', + resource_path='/v3/index/packetstorm', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -225599,7 +225599,7 @@ def _index_palo_alto_get_serialize( @validate_call - def index_panasonic_get( + def index_palantir_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -225637,10 +225637,10 @@ def index_panasonic_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination: - """Return vulnerability data stored in index \"panasonic\" + ) -> RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination: + """Return vulnerability data stored in index \"palantir\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the panasonic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Panasonic Vulnerability Advisory List ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/panasonic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/panasonic?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palantir index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palantir Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palantir?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palantir?cursor=` :param page: set the page number of the response :type page: int @@ -225712,7 +225712,7 @@ def index_panasonic_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_panasonic_get_serialize( + _param = self._index_palantir_get_serialize( page=page, limit=limit, cursor=cursor, @@ -225744,7 +225744,7 @@ def index_panasonic_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination", '404': "str", '500': "str", } @@ -225760,7 +225760,7 @@ def index_panasonic_get( @validate_call - def index_panasonic_get_with_http_info( + def index_palantir_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -225798,10 +225798,10 @@ def index_panasonic_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination]: - """Return vulnerability data stored in index \"panasonic\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination]: + """Return vulnerability data stored in index \"palantir\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the panasonic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Panasonic Vulnerability Advisory List ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/panasonic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/panasonic?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palantir index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palantir Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palantir?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palantir?cursor=` :param page: set the page number of the response :type page: int @@ -225873,7 +225873,7 @@ def index_panasonic_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_panasonic_get_serialize( + _param = self._index_palantir_get_serialize( page=page, limit=limit, cursor=cursor, @@ -225905,7 +225905,7 @@ def index_panasonic_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination", '404': "str", '500': "str", } @@ -225921,7 +225921,7 @@ def index_panasonic_get_with_http_info( @validate_call - def index_panasonic_get_without_preload_content( + def index_palantir_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -225960,9 +225960,9 @@ def index_panasonic_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"panasonic\" + """Return vulnerability data stored in index \"palantir\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the panasonic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Panasonic Vulnerability Advisory List ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/panasonic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/panasonic?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palantir index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palantir Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palantir?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palantir?cursor=` :param page: set the page number of the response :type page: int @@ -226034,7 +226034,7 @@ def index_panasonic_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_panasonic_get_serialize( + _param = self._index_palantir_get_serialize( page=page, limit=limit, cursor=cursor, @@ -226066,7 +226066,7 @@ def index_panasonic_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination", '404': "str", '500': "str", } @@ -226077,7 +226077,7 @@ def index_panasonic_get_without_preload_content( return response_data.response - def _index_panasonic_get_serialize( + def _index_palantir_get_serialize( self, page, limit, @@ -226245,7 +226245,7 @@ def _index_panasonic_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/panasonic', + resource_path='/v3/index/palantir', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -226262,7 +226262,7 @@ def _index_panasonic_get_serialize( @validate_call - def index_papercut_get( + def index_palo_alto_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -226300,10 +226300,10 @@ def index_papercut_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination: - """Return vulnerability data stored in index \"papercut\" + ) -> RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"palo-alto\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the papercut index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PaperCut Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/papercut?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/papercut?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palo-alto index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palo Alto Networks Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palo-alto?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palo-alto?cursor=` :param page: set the page number of the response :type page: int @@ -226375,7 +226375,7 @@ def index_papercut_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_papercut_get_serialize( + _param = self._index_palo_alto_get_serialize( page=page, limit=limit, cursor=cursor, @@ -226407,7 +226407,7 @@ def index_papercut_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -226423,7 +226423,7 @@ def index_papercut_get( @validate_call - def index_papercut_get_with_http_info( + def index_palo_alto_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -226461,10 +226461,10 @@ def index_papercut_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination]: - """Return vulnerability data stored in index \"papercut\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"palo-alto\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the papercut index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PaperCut Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/papercut?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/papercut?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palo-alto index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palo Alto Networks Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palo-alto?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palo-alto?cursor=` :param page: set the page number of the response :type page: int @@ -226536,7 +226536,7 @@ def index_papercut_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_papercut_get_serialize( + _param = self._index_palo_alto_get_serialize( page=page, limit=limit, cursor=cursor, @@ -226568,7 +226568,7 @@ def index_papercut_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -226584,7 +226584,7 @@ def index_papercut_get_with_http_info( @validate_call - def index_papercut_get_without_preload_content( + def index_palo_alto_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -226623,9 +226623,9 @@ def index_papercut_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"papercut\" + """Return vulnerability data stored in index \"palo-alto\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the papercut index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PaperCut Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/papercut?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/papercut?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the palo-alto index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Palo Alto Networks Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/palo-alto?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/palo-alto?cursor=` :param page: set the page number of the response :type page: int @@ -226697,7 +226697,7 @@ def index_papercut_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_papercut_get_serialize( + _param = self._index_palo_alto_get_serialize( page=page, limit=limit, cursor=cursor, @@ -226729,7 +226729,7 @@ def index_papercut_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -226740,7 +226740,7 @@ def index_papercut_get_without_preload_content( return response_data.response - def _index_papercut_get_serialize( + def _index_palo_alto_get_serialize( self, page, limit, @@ -226908,7 +226908,7 @@ def _index_papercut_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/papercut', + resource_path='/v3/index/palo-alto', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -226925,7 +226925,7 @@ def _index_papercut_get_serialize( @validate_call - def index_pega_get( + def index_panasonic_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -226963,10 +226963,10 @@ def index_pega_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination: - """Return vulnerability data stored in index \"pega\" + ) -> RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination: + """Return vulnerability data stored in index \"panasonic\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pega index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pega Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pega?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pega?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the panasonic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Panasonic Vulnerability Advisory List ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/panasonic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/panasonic?cursor=` :param page: set the page number of the response :type page: int @@ -227038,7 +227038,7 @@ def index_pega_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pega_get_serialize( + _param = self._index_panasonic_get_serialize( page=page, limit=limit, cursor=cursor, @@ -227070,7 +227070,7 @@ def index_pega_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination", '404': "str", '500': "str", } @@ -227086,7 +227086,7 @@ def index_pega_get( @validate_call - def index_pega_get_with_http_info( + def index_panasonic_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -227124,10 +227124,10 @@ def index_pega_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination]: - """Return vulnerability data stored in index \"pega\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination]: + """Return vulnerability data stored in index \"panasonic\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pega index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pega Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pega?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pega?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the panasonic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Panasonic Vulnerability Advisory List ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/panasonic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/panasonic?cursor=` :param page: set the page number of the response :type page: int @@ -227199,7 +227199,7 @@ def index_pega_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pega_get_serialize( + _param = self._index_panasonic_get_serialize( page=page, limit=limit, cursor=cursor, @@ -227231,7 +227231,7 @@ def index_pega_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination", '404': "str", '500': "str", } @@ -227247,7 +227247,7 @@ def index_pega_get_with_http_info( @validate_call - def index_pega_get_without_preload_content( + def index_panasonic_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -227286,9 +227286,9 @@ def index_pega_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"pega\" + """Return vulnerability data stored in index \"panasonic\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pega index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pega Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pega?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pega?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the panasonic index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Panasonic Vulnerability Advisory List ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/panasonic?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/panasonic?cursor=` :param page: set the page number of the response :type page: int @@ -227360,7 +227360,7 @@ def index_pega_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pega_get_serialize( + _param = self._index_panasonic_get_serialize( page=page, limit=limit, cursor=cursor, @@ -227392,7 +227392,7 @@ def index_pega_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination", '404': "str", '500': "str", } @@ -227403,7 +227403,7 @@ def index_pega_get_without_preload_content( return response_data.response - def _index_pega_get_serialize( + def _index_panasonic_get_serialize( self, page, limit, @@ -227571,7 +227571,7 @@ def _index_pega_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/pega', + resource_path='/v3/index/panasonic', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -227588,7 +227588,7 @@ def _index_pega_get_serialize( @validate_call - def index_philips_get( + def index_papercut_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -227626,10 +227626,10 @@ def index_philips_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"philips\" + ) -> RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination: + """Return vulnerability data stored in index \"papercut\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the philips index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Philips Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/philips?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/philips?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the papercut index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PaperCut Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/papercut?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/papercut?cursor=` :param page: set the page number of the response :type page: int @@ -227701,7 +227701,7 @@ def index_philips_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_philips_get_serialize( + _param = self._index_papercut_get_serialize( page=page, limit=limit, cursor=cursor, @@ -227733,7 +227733,7 @@ def index_philips_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination", '404': "str", '500': "str", } @@ -227749,7 +227749,7 @@ def index_philips_get( @validate_call - def index_philips_get_with_http_info( + def index_papercut_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -227787,10 +227787,10 @@ def index_philips_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"philips\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination]: + """Return vulnerability data stored in index \"papercut\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the philips index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Philips Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/philips?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/philips?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the papercut index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PaperCut Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/papercut?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/papercut?cursor=` :param page: set the page number of the response :type page: int @@ -227862,7 +227862,7 @@ def index_philips_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_philips_get_serialize( + _param = self._index_papercut_get_serialize( page=page, limit=limit, cursor=cursor, @@ -227894,7 +227894,7 @@ def index_philips_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination", '404': "str", '500': "str", } @@ -227910,7 +227910,7 @@ def index_philips_get_with_http_info( @validate_call - def index_philips_get_without_preload_content( + def index_papercut_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -227949,9 +227949,9 @@ def index_philips_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"philips\" + """Return vulnerability data stored in index \"papercut\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the philips index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Philips Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/philips?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/philips?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the papercut index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PaperCut Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/papercut?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/papercut?cursor=` :param page: set the page number of the response :type page: int @@ -228023,7 +228023,7 @@ def index_philips_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_philips_get_serialize( + _param = self._index_papercut_get_serialize( page=page, limit=limit, cursor=cursor, @@ -228055,7 +228055,7 @@ def index_philips_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination", '404': "str", '500': "str", } @@ -228066,7 +228066,7 @@ def index_philips_get_without_preload_content( return response_data.response - def _index_philips_get_serialize( + def _index_papercut_get_serialize( self, page, limit, @@ -228234,7 +228234,7 @@ def _index_philips_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/philips', + resource_path='/v3/index/papercut', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -228251,7 +228251,7 @@ def _index_philips_get_serialize( @validate_call - def index_phoenix_contact_get( + def index_pega_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -228289,10 +228289,10 @@ def index_phoenix_contact_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"phoenix-contact\" + ) -> RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination: + """Return vulnerability data stored in index \"pega\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the phoenix-contact index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Phoenix Contact Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/phoenix-contact?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/phoenix-contact?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pega index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pega Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pega?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pega?cursor=` :param page: set the page number of the response :type page: int @@ -228364,7 +228364,7 @@ def index_phoenix_contact_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_phoenix_contact_get_serialize( + _param = self._index_pega_get_serialize( page=page, limit=limit, cursor=cursor, @@ -228396,7 +228396,7 @@ def index_phoenix_contact_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination", '404': "str", '500': "str", } @@ -228412,7 +228412,7 @@ def index_phoenix_contact_get( @validate_call - def index_phoenix_contact_get_with_http_info( + def index_pega_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -228450,10 +228450,10 @@ def index_phoenix_contact_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"phoenix-contact\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination]: + """Return vulnerability data stored in index \"pega\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the phoenix-contact index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Phoenix Contact Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/phoenix-contact?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/phoenix-contact?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pega index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pega Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pega?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pega?cursor=` :param page: set the page number of the response :type page: int @@ -228525,7 +228525,7 @@ def index_phoenix_contact_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_phoenix_contact_get_serialize( + _param = self._index_pega_get_serialize( page=page, limit=limit, cursor=cursor, @@ -228557,7 +228557,7 @@ def index_phoenix_contact_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination", '404': "str", '500': "str", } @@ -228573,7 +228573,7 @@ def index_phoenix_contact_get_with_http_info( @validate_call - def index_phoenix_contact_get_without_preload_content( + def index_pega_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -228612,9 +228612,9 @@ def index_phoenix_contact_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"phoenix-contact\" + """Return vulnerability data stored in index \"pega\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the phoenix-contact index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Phoenix Contact Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/phoenix-contact?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/phoenix-contact?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pega index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pega Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pega?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pega?cursor=` :param page: set the page number of the response :type page: int @@ -228686,7 +228686,7 @@ def index_phoenix_contact_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_phoenix_contact_get_serialize( + _param = self._index_pega_get_serialize( page=page, limit=limit, cursor=cursor, @@ -228718,7 +228718,7 @@ def index_phoenix_contact_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination", '404': "str", '500': "str", } @@ -228729,7 +228729,7 @@ def index_phoenix_contact_get_without_preload_content( return response_data.response - def _index_phoenix_contact_get_serialize( + def _index_pega_get_serialize( self, page, limit, @@ -228897,7 +228897,7 @@ def _index_phoenix_contact_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/phoenix-contact', + resource_path='/v3/index/pega', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -228914,7 +228914,7 @@ def _index_phoenix_contact_get_serialize( @validate_call - def index_php_my_admin_get( + def index_philips_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -228952,10 +228952,10 @@ def index_php_my_admin_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination: - """Return vulnerability data stored in index \"php-my-admin\" + ) -> RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"philips\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the php-my-admin index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** phpMyAdmin Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/php-my-admin?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/php-my-admin?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the philips index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Philips Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/philips?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/philips?cursor=` :param page: set the page number of the response :type page: int @@ -229027,7 +229027,7 @@ def index_php_my_admin_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_php_my_admin_get_serialize( + _param = self._index_philips_get_serialize( page=page, limit=limit, cursor=cursor, @@ -229059,7 +229059,7 @@ def index_php_my_admin_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -229075,7 +229075,7 @@ def index_php_my_admin_get( @validate_call - def index_php_my_admin_get_with_http_info( + def index_philips_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -229113,10 +229113,10 @@ def index_php_my_admin_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination]: - """Return vulnerability data stored in index \"php-my-admin\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"philips\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the php-my-admin index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** phpMyAdmin Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/php-my-admin?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/php-my-admin?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the philips index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Philips Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/philips?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/philips?cursor=` :param page: set the page number of the response :type page: int @@ -229188,7 +229188,7 @@ def index_php_my_admin_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_php_my_admin_get_serialize( + _param = self._index_philips_get_serialize( page=page, limit=limit, cursor=cursor, @@ -229220,7 +229220,7 @@ def index_php_my_admin_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -229236,7 +229236,7 @@ def index_php_my_admin_get_with_http_info( @validate_call - def index_php_my_admin_get_without_preload_content( + def index_philips_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -229275,9 +229275,9 @@ def index_php_my_admin_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"php-my-admin\" + """Return vulnerability data stored in index \"philips\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the php-my-admin index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** phpMyAdmin Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/php-my-admin?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/php-my-admin?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the philips index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Philips Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/philips?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/philips?cursor=` :param page: set the page number of the response :type page: int @@ -229349,7 +229349,7 @@ def index_php_my_admin_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_php_my_admin_get_serialize( + _param = self._index_philips_get_serialize( page=page, limit=limit, cursor=cursor, @@ -229381,7 +229381,7 @@ def index_php_my_admin_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -229392,7 +229392,7 @@ def index_php_my_admin_get_without_preload_content( return response_data.response - def _index_php_my_admin_get_serialize( + def _index_philips_get_serialize( self, page, limit, @@ -229560,7 +229560,7 @@ def _index_php_my_admin_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/php-my-admin', + resource_path='/v3/index/philips', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -229577,7 +229577,7 @@ def _index_php_my_admin_get_serialize( @validate_call - def index_pkcert_get( + def index_phoenix_contact_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -229615,10 +229615,10 @@ def index_pkcert_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination: - """Return vulnerability data stored in index \"pkcert\" + ) -> RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"phoenix-contact\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pkcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PK CERT Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pkcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pkcert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the phoenix-contact index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Phoenix Contact Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/phoenix-contact?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/phoenix-contact?cursor=` :param page: set the page number of the response :type page: int @@ -229690,7 +229690,7 @@ def index_pkcert_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pkcert_get_serialize( + _param = self._index_phoenix_contact_get_serialize( page=page, limit=limit, cursor=cursor, @@ -229722,7 +229722,7 @@ def index_pkcert_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -229738,7 +229738,7 @@ def index_pkcert_get( @validate_call - def index_pkcert_get_with_http_info( + def index_phoenix_contact_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -229776,10 +229776,10 @@ def index_pkcert_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination]: - """Return vulnerability data stored in index \"pkcert\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"phoenix-contact\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pkcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PK CERT Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pkcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pkcert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the phoenix-contact index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Phoenix Contact Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/phoenix-contact?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/phoenix-contact?cursor=` :param page: set the page number of the response :type page: int @@ -229851,7 +229851,7 @@ def index_pkcert_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pkcert_get_serialize( + _param = self._index_phoenix_contact_get_serialize( page=page, limit=limit, cursor=cursor, @@ -229883,7 +229883,7 @@ def index_pkcert_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -229899,7 +229899,7 @@ def index_pkcert_get_with_http_info( @validate_call - def index_pkcert_get_without_preload_content( + def index_phoenix_contact_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -229938,9 +229938,9 @@ def index_pkcert_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"pkcert\" + """Return vulnerability data stored in index \"phoenix-contact\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pkcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PK CERT Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pkcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pkcert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the phoenix-contact index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Phoenix Contact Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/phoenix-contact?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/phoenix-contact?cursor=` :param page: set the page number of the response :type page: int @@ -230012,7 +230012,7 @@ def index_pkcert_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pkcert_get_serialize( + _param = self._index_phoenix_contact_get_serialize( page=page, limit=limit, cursor=cursor, @@ -230044,7 +230044,7 @@ def index_pkcert_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -230055,7 +230055,7 @@ def index_pkcert_get_without_preload_content( return response_data.response - def _index_pkcert_get_serialize( + def _index_phoenix_contact_get_serialize( self, page, limit, @@ -230223,7 +230223,7 @@ def _index_pkcert_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/pkcert', + resource_path='/v3/index/phoenix-contact', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -230240,7 +230240,7 @@ def _index_pkcert_get_serialize( @validate_call - def index_postgressql_get( + def index_php_my_admin_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -230278,10 +230278,10 @@ def index_postgressql_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination: - """Return vulnerability data stored in index \"postgressql\" + ) -> RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination: + """Return vulnerability data stored in index \"php-my-admin\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the postgressql index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PostgresSQL Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/postgressql?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/postgressql?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the php-my-admin index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** phpMyAdmin Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/php-my-admin?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/php-my-admin?cursor=` :param page: set the page number of the response :type page: int @@ -230353,7 +230353,7 @@ def index_postgressql_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_postgressql_get_serialize( + _param = self._index_php_my_admin_get_serialize( page=page, limit=limit, cursor=cursor, @@ -230385,7 +230385,7 @@ def index_postgressql_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination", '404': "str", '500': "str", } @@ -230401,7 +230401,7 @@ def index_postgressql_get( @validate_call - def index_postgressql_get_with_http_info( + def index_php_my_admin_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -230439,10 +230439,10 @@ def index_postgressql_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination]: - """Return vulnerability data stored in index \"postgressql\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination]: + """Return vulnerability data stored in index \"php-my-admin\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the postgressql index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PostgresSQL Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/postgressql?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/postgressql?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the php-my-admin index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** phpMyAdmin Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/php-my-admin?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/php-my-admin?cursor=` :param page: set the page number of the response :type page: int @@ -230514,7 +230514,7 @@ def index_postgressql_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_postgressql_get_serialize( + _param = self._index_php_my_admin_get_serialize( page=page, limit=limit, cursor=cursor, @@ -230546,7 +230546,7 @@ def index_postgressql_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination", '404': "str", '500': "str", } @@ -230562,7 +230562,7 @@ def index_postgressql_get_with_http_info( @validate_call - def index_postgressql_get_without_preload_content( + def index_php_my_admin_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -230601,9 +230601,9 @@ def index_postgressql_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"postgressql\" + """Return vulnerability data stored in index \"php-my-admin\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the postgressql index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PostgresSQL Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/postgressql?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/postgressql?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the php-my-admin index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** phpMyAdmin Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/php-my-admin?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/php-my-admin?cursor=` :param page: set the page number of the response :type page: int @@ -230675,7 +230675,7 @@ def index_postgressql_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_postgressql_get_serialize( + _param = self._index_php_my_admin_get_serialize( page=page, limit=limit, cursor=cursor, @@ -230707,7 +230707,7 @@ def index_postgressql_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination", '404': "str", '500': "str", } @@ -230718,7 +230718,7 @@ def index_postgressql_get_without_preload_content( return response_data.response - def _index_postgressql_get_serialize( + def _index_php_my_admin_get_serialize( self, page, limit, @@ -230886,7 +230886,7 @@ def _index_postgressql_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/postgressql', + resource_path='/v3/index/php-my-admin', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -230903,7 +230903,7 @@ def _index_postgressql_get_serialize( @validate_call - def index_powerdns_get( + def index_pkcert_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -230941,10 +230941,10 @@ def index_powerdns_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination: - """Return vulnerability data stored in index \"powerdns\" + ) -> RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination: + """Return vulnerability data stored in index \"pkcert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the powerdns index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PowerDNS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/powerdns?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/powerdns?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pkcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PK CERT Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pkcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pkcert?cursor=` :param page: set the page number of the response :type page: int @@ -231016,7 +231016,7 @@ def index_powerdns_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_powerdns_get_serialize( + _param = self._index_pkcert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -231048,7 +231048,7 @@ def index_powerdns_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination", '404': "str", '500': "str", } @@ -231064,7 +231064,7 @@ def index_powerdns_get( @validate_call - def index_powerdns_get_with_http_info( + def index_pkcert_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -231102,10 +231102,10 @@ def index_powerdns_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination]: - """Return vulnerability data stored in index \"powerdns\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination]: + """Return vulnerability data stored in index \"pkcert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the powerdns index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PowerDNS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/powerdns?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/powerdns?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pkcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PK CERT Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pkcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pkcert?cursor=` :param page: set the page number of the response :type page: int @@ -231177,7 +231177,7 @@ def index_powerdns_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_powerdns_get_serialize( + _param = self._index_pkcert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -231209,7 +231209,7 @@ def index_powerdns_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination", '404': "str", '500': "str", } @@ -231225,7 +231225,7 @@ def index_powerdns_get_with_http_info( @validate_call - def index_powerdns_get_without_preload_content( + def index_pkcert_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -231264,9 +231264,9 @@ def index_powerdns_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"powerdns\" + """Return vulnerability data stored in index \"pkcert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the powerdns index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PowerDNS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/powerdns?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/powerdns?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pkcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PK CERT Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pkcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pkcert?cursor=` :param page: set the page number of the response :type page: int @@ -231338,7 +231338,7 @@ def index_powerdns_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_powerdns_get_serialize( + _param = self._index_pkcert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -231370,7 +231370,7 @@ def index_powerdns_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination", '404': "str", '500': "str", } @@ -231381,7 +231381,7 @@ def index_powerdns_get_without_preload_content( return response_data.response - def _index_powerdns_get_serialize( + def _index_pkcert_get_serialize( self, page, limit, @@ -231549,7 +231549,7 @@ def _index_powerdns_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/powerdns', + resource_path='/v3/index/pkcert', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -231566,7 +231566,7 @@ def _index_powerdns_get_serialize( @validate_call - def index_progress_get( + def index_postgressql_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -231604,10 +231604,10 @@ def index_progress_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination: - """Return vulnerability data stored in index \"progress\" + ) -> RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination: + """Return vulnerability data stored in index \"postgressql\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the progress index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Progress Product Alert Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/progress?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/progress?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the postgressql index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PostgresSQL Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/postgressql?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/postgressql?cursor=` :param page: set the page number of the response :type page: int @@ -231679,7 +231679,7 @@ def index_progress_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_progress_get_serialize( + _param = self._index_postgressql_get_serialize( page=page, limit=limit, cursor=cursor, @@ -231711,7 +231711,7 @@ def index_progress_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination", '404': "str", '500': "str", } @@ -231727,7 +231727,7 @@ def index_progress_get( @validate_call - def index_progress_get_with_http_info( + def index_postgressql_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -231765,10 +231765,10 @@ def index_progress_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination]: - """Return vulnerability data stored in index \"progress\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination]: + """Return vulnerability data stored in index \"postgressql\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the progress index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Progress Product Alert Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/progress?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/progress?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the postgressql index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PostgresSQL Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/postgressql?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/postgressql?cursor=` :param page: set the page number of the response :type page: int @@ -231840,7 +231840,7 @@ def index_progress_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_progress_get_serialize( + _param = self._index_postgressql_get_serialize( page=page, limit=limit, cursor=cursor, @@ -231872,7 +231872,7 @@ def index_progress_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination", '404': "str", '500': "str", } @@ -231888,7 +231888,7 @@ def index_progress_get_with_http_info( @validate_call - def index_progress_get_without_preload_content( + def index_postgressql_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -231927,9 +231927,9 @@ def index_progress_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"progress\" + """Return vulnerability data stored in index \"postgressql\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the progress index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Progress Product Alert Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/progress?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/progress?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the postgressql index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PostgresSQL Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/postgressql?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/postgressql?cursor=` :param page: set the page number of the response :type page: int @@ -232001,7 +232001,7 @@ def index_progress_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_progress_get_serialize( + _param = self._index_postgressql_get_serialize( page=page, limit=limit, cursor=cursor, @@ -232033,7 +232033,7 @@ def index_progress_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination", '404': "str", '500': "str", } @@ -232044,7 +232044,7 @@ def index_progress_get_without_preload_content( return response_data.response - def _index_progress_get_serialize( + def _index_postgressql_get_serialize( self, page, limit, @@ -232212,7 +232212,7 @@ def _index_progress_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/progress', + resource_path='/v3/index/postgressql', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -232229,7 +232229,7 @@ def _index_progress_get_serialize( @validate_call - def index_proofpoint_get( + def index_powerdns_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -232267,10 +232267,10 @@ def index_proofpoint_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination: - """Return vulnerability data stored in index \"proofpoint\" + ) -> RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination: + """Return vulnerability data stored in index \"powerdns\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the proofpoint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Proofpoint Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/proofpoint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/proofpoint?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the powerdns index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PowerDNS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/powerdns?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/powerdns?cursor=` :param page: set the page number of the response :type page: int @@ -232342,7 +232342,7 @@ def index_proofpoint_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_proofpoint_get_serialize( + _param = self._index_powerdns_get_serialize( page=page, limit=limit, cursor=cursor, @@ -232374,7 +232374,7 @@ def index_proofpoint_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination", '404': "str", '500': "str", } @@ -232390,7 +232390,7 @@ def index_proofpoint_get( @validate_call - def index_proofpoint_get_with_http_info( + def index_powerdns_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -232428,10 +232428,10 @@ def index_proofpoint_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination]: - """Return vulnerability data stored in index \"proofpoint\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination]: + """Return vulnerability data stored in index \"powerdns\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the proofpoint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Proofpoint Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/proofpoint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/proofpoint?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the powerdns index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PowerDNS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/powerdns?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/powerdns?cursor=` :param page: set the page number of the response :type page: int @@ -232503,7 +232503,7 @@ def index_proofpoint_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_proofpoint_get_serialize( + _param = self._index_powerdns_get_serialize( page=page, limit=limit, cursor=cursor, @@ -232535,7 +232535,7 @@ def index_proofpoint_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination", '404': "str", '500': "str", } @@ -232551,7 +232551,7 @@ def index_proofpoint_get_with_http_info( @validate_call - def index_proofpoint_get_without_preload_content( + def index_powerdns_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -232590,9 +232590,9 @@ def index_proofpoint_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"proofpoint\" + """Return vulnerability data stored in index \"powerdns\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the proofpoint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Proofpoint Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/proofpoint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/proofpoint?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the powerdns index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PowerDNS Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/powerdns?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/powerdns?cursor=` :param page: set the page number of the response :type page: int @@ -232664,7 +232664,7 @@ def index_proofpoint_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_proofpoint_get_serialize( + _param = self._index_powerdns_get_serialize( page=page, limit=limit, cursor=cursor, @@ -232696,7 +232696,7 @@ def index_proofpoint_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination", '404': "str", '500': "str", } @@ -232707,7 +232707,7 @@ def index_proofpoint_get_without_preload_content( return response_data.response - def _index_proofpoint_get_serialize( + def _index_powerdns_get_serialize( self, page, limit, @@ -232875,7 +232875,7 @@ def _index_proofpoint_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/proofpoint', + resource_path='/v3/index/powerdns', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -232892,7 +232892,7 @@ def _index_proofpoint_get_serialize( @validate_call - def index_ptc_get( + def index_progress_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -232930,10 +232930,10 @@ def index_ptc_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination: - """Return vulnerability data stored in index \"ptc\" + ) -> RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination: + """Return vulnerability data stored in index \"progress\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ptc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PTC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ptc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ptc?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the progress index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Progress Product Alert Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/progress?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/progress?cursor=` :param page: set the page number of the response :type page: int @@ -233005,7 +233005,7 @@ def index_ptc_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ptc_get_serialize( + _param = self._index_progress_get_serialize( page=page, limit=limit, cursor=cursor, @@ -233037,7 +233037,7 @@ def index_ptc_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination", '404': "str", '500': "str", } @@ -233053,7 +233053,7 @@ def index_ptc_get( @validate_call - def index_ptc_get_with_http_info( + def index_progress_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -233091,10 +233091,10 @@ def index_ptc_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination]: - """Return vulnerability data stored in index \"ptc\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination]: + """Return vulnerability data stored in index \"progress\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ptc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PTC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ptc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ptc?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the progress index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Progress Product Alert Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/progress?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/progress?cursor=` :param page: set the page number of the response :type page: int @@ -233166,7 +233166,7 @@ def index_ptc_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ptc_get_serialize( + _param = self._index_progress_get_serialize( page=page, limit=limit, cursor=cursor, @@ -233198,7 +233198,7 @@ def index_ptc_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination", '404': "str", '500': "str", } @@ -233214,7 +233214,7 @@ def index_ptc_get_with_http_info( @validate_call - def index_ptc_get_without_preload_content( + def index_progress_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -233253,9 +233253,9 @@ def index_ptc_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ptc\" + """Return vulnerability data stored in index \"progress\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ptc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PTC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ptc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ptc?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the progress index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Progress Product Alert Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/progress?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/progress?cursor=` :param page: set the page number of the response :type page: int @@ -233327,7 +233327,7 @@ def index_ptc_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ptc_get_serialize( + _param = self._index_progress_get_serialize( page=page, limit=limit, cursor=cursor, @@ -233359,7 +233359,7 @@ def index_ptc_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination", '404': "str", '500': "str", } @@ -233370,7 +233370,7 @@ def index_ptc_get_without_preload_content( return response_data.response - def _index_ptc_get_serialize( + def _index_progress_get_serialize( self, page, limit, @@ -233538,7 +233538,7 @@ def _index_ptc_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ptc', + resource_path='/v3/index/progress', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -233555,7 +233555,7 @@ def _index_ptc_get_serialize( @validate_call - def index_pub_get( + def index_proofpoint_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -233593,10 +233593,10 @@ def index_pub_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: - """Return vulnerability data stored in index \"pub\" + ) -> RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination: + """Return vulnerability data stored in index \"proofpoint\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pub index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pub (Dart/Flutter) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pub?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pub?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the proofpoint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Proofpoint Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/proofpoint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/proofpoint?cursor=` :param page: set the page number of the response :type page: int @@ -233668,7 +233668,7 @@ def index_pub_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pub_get_serialize( + _param = self._index_proofpoint_get_serialize( page=page, limit=limit, cursor=cursor, @@ -233700,7 +233700,7 @@ def index_pub_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination", '404': "str", '500': "str", } @@ -233716,7 +233716,7 @@ def index_pub_get( @validate_call - def index_pub_get_with_http_info( + def index_proofpoint_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -233754,10 +233754,10 @@ def index_pub_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: - """Return vulnerability data stored in index \"pub\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination]: + """Return vulnerability data stored in index \"proofpoint\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pub index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pub (Dart/Flutter) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pub?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pub?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the proofpoint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Proofpoint Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/proofpoint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/proofpoint?cursor=` :param page: set the page number of the response :type page: int @@ -233829,7 +233829,7 @@ def index_pub_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pub_get_serialize( + _param = self._index_proofpoint_get_serialize( page=page, limit=limit, cursor=cursor, @@ -233861,7 +233861,7 @@ def index_pub_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination", '404': "str", '500': "str", } @@ -233877,7 +233877,7 @@ def index_pub_get_with_http_info( @validate_call - def index_pub_get_without_preload_content( + def index_proofpoint_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -233916,9 +233916,9 @@ def index_pub_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"pub\" + """Return vulnerability data stored in index \"proofpoint\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pub index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pub (Dart/Flutter) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pub?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pub?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the proofpoint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Proofpoint Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/proofpoint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/proofpoint?cursor=` :param page: set the page number of the response :type page: int @@ -233990,7 +233990,7 @@ def index_pub_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pub_get_serialize( + _param = self._index_proofpoint_get_serialize( page=page, limit=limit, cursor=cursor, @@ -234022,7 +234022,7 @@ def index_pub_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination", '404': "str", '500': "str", } @@ -234033,7 +234033,7 @@ def index_pub_get_without_preload_content( return response_data.response - def _index_pub_get_serialize( + def _index_proofpoint_get_serialize( self, page, limit, @@ -234201,7 +234201,7 @@ def _index_pub_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/pub', + resource_path='/v3/index/proofpoint', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -234218,7 +234218,7 @@ def _index_pub_get_serialize( @validate_call - def index_pure_storage_get( + def index_ptc_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -234256,10 +234256,10 @@ def index_pure_storage_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination: - """Return vulnerability data stored in index \"pure-storage\" + ) -> RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination: + """Return vulnerability data stored in index \"ptc\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pure-storage index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pure Storage Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pure-storage?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pure-storage?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ptc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PTC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ptc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ptc?cursor=` :param page: set the page number of the response :type page: int @@ -234331,7 +234331,7 @@ def index_pure_storage_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pure_storage_get_serialize( + _param = self._index_ptc_get_serialize( page=page, limit=limit, cursor=cursor, @@ -234363,7 +234363,7 @@ def index_pure_storage_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination", '404': "str", '500': "str", } @@ -234379,7 +234379,7 @@ def index_pure_storage_get( @validate_call - def index_pure_storage_get_with_http_info( + def index_ptc_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -234417,10 +234417,10 @@ def index_pure_storage_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination]: - """Return vulnerability data stored in index \"pure-storage\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination]: + """Return vulnerability data stored in index \"ptc\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pure-storage index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pure Storage Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pure-storage?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pure-storage?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ptc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PTC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ptc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ptc?cursor=` :param page: set the page number of the response :type page: int @@ -234492,7 +234492,7 @@ def index_pure_storage_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pure_storage_get_serialize( + _param = self._index_ptc_get_serialize( page=page, limit=limit, cursor=cursor, @@ -234524,7 +234524,7 @@ def index_pure_storage_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination", '404': "str", '500': "str", } @@ -234540,7 +234540,7 @@ def index_pure_storage_get_with_http_info( @validate_call - def index_pure_storage_get_without_preload_content( + def index_ptc_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -234579,9 +234579,9 @@ def index_pure_storage_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"pure-storage\" + """Return vulnerability data stored in index \"ptc\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pure-storage index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pure Storage Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pure-storage?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pure-storage?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ptc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PTC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ptc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ptc?cursor=` :param page: set the page number of the response :type page: int @@ -234653,7 +234653,7 @@ def index_pure_storage_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pure_storage_get_serialize( + _param = self._index_ptc_get_serialize( page=page, limit=limit, cursor=cursor, @@ -234685,7 +234685,7 @@ def index_pure_storage_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination", '404': "str", '500': "str", } @@ -234696,7 +234696,7 @@ def index_pure_storage_get_without_preload_content( return response_data.response - def _index_pure_storage_get_serialize( + def _index_ptc_get_serialize( self, page, limit, @@ -234864,7 +234864,7 @@ def _index_pure_storage_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/pure-storage', + resource_path='/v3/index/ptc', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -234881,7 +234881,7 @@ def _index_pure_storage_get_serialize( @validate_call - def index_pypa_advisories_get( + def index_pub_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -234919,10 +234919,10 @@ def index_pypa_advisories_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"pypa-advisories\" + ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: + """Return vulnerability data stored in index \"pub\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypa-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPA Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypa-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypa-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pub index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pub (Dart/Flutter) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pub?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pub?cursor=` :param page: set the page number of the response :type page: int @@ -234994,7 +234994,7 @@ def index_pypa_advisories_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pypa_advisories_get_serialize( + _param = self._index_pub_get_serialize( page=page, limit=limit, cursor=cursor, @@ -235026,7 +235026,7 @@ def index_pypa_advisories_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -235042,7 +235042,7 @@ def index_pypa_advisories_get( @validate_call - def index_pypa_advisories_get_with_http_info( + def index_pub_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -235080,10 +235080,10 @@ def index_pypa_advisories_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"pypa-advisories\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: + """Return vulnerability data stored in index \"pub\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypa-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPA Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypa-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypa-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pub index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pub (Dart/Flutter) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pub?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pub?cursor=` :param page: set the page number of the response :type page: int @@ -235155,7 +235155,7 @@ def index_pypa_advisories_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pypa_advisories_get_serialize( + _param = self._index_pub_get_serialize( page=page, limit=limit, cursor=cursor, @@ -235187,7 +235187,7 @@ def index_pypa_advisories_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -235203,7 +235203,7 @@ def index_pypa_advisories_get_with_http_info( @validate_call - def index_pypa_advisories_get_without_preload_content( + def index_pub_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -235242,9 +235242,9 @@ def index_pypa_advisories_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"pypa-advisories\" + """Return vulnerability data stored in index \"pub\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypa-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPA Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypa-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypa-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pub index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pub (Dart/Flutter) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pub?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pub?cursor=` :param page: set the page number of the response :type page: int @@ -235316,7 +235316,7 @@ def index_pypa_advisories_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pypa_advisories_get_serialize( + _param = self._index_pub_get_serialize( page=page, limit=limit, cursor=cursor, @@ -235348,7 +235348,7 @@ def index_pypa_advisories_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -235359,7 +235359,7 @@ def index_pypa_advisories_get_without_preload_content( return response_data.response - def _index_pypa_advisories_get_serialize( + def _index_pub_get_serialize( self, page, limit, @@ -235527,7 +235527,7 @@ def _index_pypa_advisories_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/pypa-advisories', + resource_path='/v3/index/pub', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -235544,7 +235544,7 @@ def _index_pypa_advisories_get_serialize( @validate_call - def index_pypi_get( + def index_pure_storage_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -235582,10 +235582,10 @@ def index_pypi_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: - """Return vulnerability data stored in index \"pypi\" + ) -> RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination: + """Return vulnerability data stored in index \"pure-storage\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPi (Python) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypi?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pure-storage index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pure Storage Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pure-storage?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pure-storage?cursor=` :param page: set the page number of the response :type page: int @@ -235657,7 +235657,7 @@ def index_pypi_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pypi_get_serialize( + _param = self._index_pure_storage_get_serialize( page=page, limit=limit, cursor=cursor, @@ -235689,7 +235689,7 @@ def index_pypi_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination", '404': "str", '500': "str", } @@ -235705,7 +235705,7 @@ def index_pypi_get( @validate_call - def index_pypi_get_with_http_info( + def index_pure_storage_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -235743,10 +235743,10 @@ def index_pypi_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: - """Return vulnerability data stored in index \"pypi\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination]: + """Return vulnerability data stored in index \"pure-storage\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPi (Python) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypi?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pure-storage index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pure Storage Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pure-storage?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pure-storage?cursor=` :param page: set the page number of the response :type page: int @@ -235818,7 +235818,7 @@ def index_pypi_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pypi_get_serialize( + _param = self._index_pure_storage_get_serialize( page=page, limit=limit, cursor=cursor, @@ -235850,7 +235850,7 @@ def index_pypi_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination", '404': "str", '500': "str", } @@ -235866,7 +235866,7 @@ def index_pypi_get_with_http_info( @validate_call - def index_pypi_get_without_preload_content( + def index_pure_storage_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -235905,9 +235905,9 @@ def index_pypi_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"pypi\" + """Return vulnerability data stored in index \"pure-storage\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPi (Python) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypi?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pure-storage index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Pure Storage Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pure-storage?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pure-storage?cursor=` :param page: set the page number of the response :type page: int @@ -235979,7 +235979,7 @@ def index_pypi_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_pypi_get_serialize( + _param = self._index_pure_storage_get_serialize( page=page, limit=limit, cursor=cursor, @@ -236011,7 +236011,7 @@ def index_pypi_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination", '404': "str", '500': "str", } @@ -236022,7 +236022,7 @@ def index_pypi_get_without_preload_content( return response_data.response - def _index_pypi_get_serialize( + def _index_pure_storage_get_serialize( self, page, limit, @@ -236190,7 +236190,7 @@ def _index_pypi_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/pypi', + resource_path='/v3/index/pure-storage', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -236207,7 +236207,7 @@ def _index_pypi_get_serialize( @validate_call - def index_qnap_get( + def index_pypa_advisories_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -236245,10 +236245,10 @@ def index_qnap_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"qnap\" + ) -> RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"pypa-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qnap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** QNAP Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qnap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qnap?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypa-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPA Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypa-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypa-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -236320,7 +236320,7 @@ def index_qnap_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qnap_get_serialize( + _param = self._index_pypa_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -236352,7 +236352,7 @@ def index_qnap_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -236368,7 +236368,7 @@ def index_qnap_get( @validate_call - def index_qnap_get_with_http_info( + def index_pypa_advisories_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -236406,10 +236406,10 @@ def index_qnap_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"qnap\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"pypa-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qnap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** QNAP Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qnap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qnap?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypa-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPA Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypa-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypa-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -236481,7 +236481,7 @@ def index_qnap_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qnap_get_serialize( + _param = self._index_pypa_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -236513,7 +236513,7 @@ def index_qnap_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -236529,7 +236529,7 @@ def index_qnap_get_with_http_info( @validate_call - def index_qnap_get_without_preload_content( + def index_pypa_advisories_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -236568,9 +236568,9 @@ def index_qnap_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"qnap\" + """Return vulnerability data stored in index \"pypa-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qnap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** QNAP Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qnap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qnap?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypa-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPA Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypa-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypa-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -236642,7 +236642,7 @@ def index_qnap_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qnap_get_serialize( + _param = self._index_pypa_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -236674,7 +236674,7 @@ def index_qnap_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -236685,7 +236685,7 @@ def index_qnap_get_without_preload_content( return response_data.response - def _index_qnap_get_serialize( + def _index_pypa_advisories_get_serialize( self, page, limit, @@ -236853,7 +236853,7 @@ def _index_qnap_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/qnap', + resource_path='/v3/index/pypa-advisories', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -236870,7 +236870,7 @@ def _index_qnap_get_serialize( @validate_call - def index_qqids_get( + def index_pypi_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -236908,10 +236908,10 @@ def index_qqids_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination: - """Return vulnerability data stored in index \"qqids\" + ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: + """Return vulnerability data stored in index \"pypi\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qqids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QIDs ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qqids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qqids?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPi (Python) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypi?cursor=` :param page: set the page number of the response :type page: int @@ -236983,7 +236983,7 @@ def index_qqids_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qqids_get_serialize( + _param = self._index_pypi_get_serialize( page=page, limit=limit, cursor=cursor, @@ -237015,7 +237015,7 @@ def index_qqids_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -237031,7 +237031,7 @@ def index_qqids_get( @validate_call - def index_qqids_get_with_http_info( + def index_pypi_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -237069,10 +237069,10 @@ def index_qqids_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination]: - """Return vulnerability data stored in index \"qqids\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: + """Return vulnerability data stored in index \"pypi\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qqids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QIDs ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qqids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qqids?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPi (Python) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypi?cursor=` :param page: set the page number of the response :type page: int @@ -237144,7 +237144,7 @@ def index_qqids_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qqids_get_serialize( + _param = self._index_pypi_get_serialize( page=page, limit=limit, cursor=cursor, @@ -237176,7 +237176,7 @@ def index_qqids_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -237192,7 +237192,7 @@ def index_qqids_get_with_http_info( @validate_call - def index_qqids_get_without_preload_content( + def index_pypi_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -237231,9 +237231,9 @@ def index_qqids_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"qqids\" + """Return vulnerability data stored in index \"pypi\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qqids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QIDs ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qqids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qqids?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the pypi index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** PyPi (Python) packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/pypi?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/pypi?cursor=` :param page: set the page number of the response :type page: int @@ -237305,7 +237305,7 @@ def index_qqids_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qqids_get_serialize( + _param = self._index_pypi_get_serialize( page=page, limit=limit, cursor=cursor, @@ -237337,7 +237337,7 @@ def index_qqids_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -237348,7 +237348,7 @@ def index_qqids_get_without_preload_content( return response_data.response - def _index_qqids_get_serialize( + def _index_pypi_get_serialize( self, page, limit, @@ -237516,7 +237516,7 @@ def _index_qqids_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/qqids', + resource_path='/v3/index/pypi', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -237533,7 +237533,7 @@ def _index_qqids_get_serialize( @validate_call - def index_qualcomm_get( + def index_qnap_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -237571,10 +237571,10 @@ def index_qualcomm_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination: - """Return vulnerability data stored in index \"qualcomm\" + ) -> RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"qnap\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualcomm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualcomm Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualcomm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualcomm?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qnap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** QNAP Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qnap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qnap?cursor=` :param page: set the page number of the response :type page: int @@ -237646,7 +237646,7 @@ def index_qualcomm_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qualcomm_get_serialize( + _param = self._index_qnap_get_serialize( page=page, limit=limit, cursor=cursor, @@ -237678,7 +237678,7 @@ def index_qualcomm_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -237694,7 +237694,7 @@ def index_qualcomm_get( @validate_call - def index_qualcomm_get_with_http_info( + def index_qnap_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -237732,10 +237732,10 @@ def index_qualcomm_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination]: - """Return vulnerability data stored in index \"qualcomm\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"qnap\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualcomm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualcomm Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualcomm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualcomm?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qnap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** QNAP Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qnap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qnap?cursor=` :param page: set the page number of the response :type page: int @@ -237807,7 +237807,7 @@ def index_qualcomm_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qualcomm_get_serialize( + _param = self._index_qnap_get_serialize( page=page, limit=limit, cursor=cursor, @@ -237839,7 +237839,7 @@ def index_qualcomm_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -237855,7 +237855,7 @@ def index_qualcomm_get_with_http_info( @validate_call - def index_qualcomm_get_without_preload_content( + def index_qnap_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -237894,9 +237894,9 @@ def index_qualcomm_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"qualcomm\" + """Return vulnerability data stored in index \"qnap\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualcomm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualcomm Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualcomm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualcomm?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qnap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** QNAP Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qnap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qnap?cursor=` :param page: set the page number of the response :type page: int @@ -237968,7 +237968,7 @@ def index_qualcomm_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qualcomm_get_serialize( + _param = self._index_qnap_get_serialize( page=page, limit=limit, cursor=cursor, @@ -238000,7 +238000,7 @@ def index_qualcomm_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -238011,7 +238011,7 @@ def index_qualcomm_get_without_preload_content( return response_data.response - def _index_qualcomm_get_serialize( + def _index_qnap_get_serialize( self, page, limit, @@ -238179,7 +238179,7 @@ def _index_qualcomm_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/qualcomm', + resource_path='/v3/index/qnap', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -238196,7 +238196,7 @@ def _index_qualcomm_get_serialize( @validate_call - def index_qualys_get( + def index_qqids_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -238234,10 +238234,10 @@ def index_qualys_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination: - """Return vulnerability data stored in index \"qualys\" + ) -> RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination: + """Return vulnerability data stored in index \"qqids\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qqids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QIDs ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qqids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qqids?cursor=` :param page: set the page number of the response :type page: int @@ -238309,7 +238309,7 @@ def index_qualys_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qualys_get_serialize( + _param = self._index_qqids_get_serialize( page=page, limit=limit, cursor=cursor, @@ -238341,7 +238341,7 @@ def index_qualys_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination", '404': "str", '500': "str", } @@ -238357,7 +238357,7 @@ def index_qualys_get( @validate_call - def index_qualys_get_with_http_info( + def index_qqids_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -238395,10 +238395,10 @@ def index_qualys_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination]: - """Return vulnerability data stored in index \"qualys\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination]: + """Return vulnerability data stored in index \"qqids\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qqids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QIDs ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qqids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qqids?cursor=` :param page: set the page number of the response :type page: int @@ -238470,7 +238470,7 @@ def index_qualys_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qualys_get_serialize( + _param = self._index_qqids_get_serialize( page=page, limit=limit, cursor=cursor, @@ -238502,7 +238502,7 @@ def index_qualys_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination", '404': "str", '500': "str", } @@ -238518,7 +238518,7 @@ def index_qualys_get_with_http_info( @validate_call - def index_qualys_get_without_preload_content( + def index_qqids_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -238557,9 +238557,9 @@ def index_qualys_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"qualys\" + """Return vulnerability data stored in index \"qqids\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qqids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QIDs ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qqids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qqids?cursor=` :param page: set the page number of the response :type page: int @@ -238631,7 +238631,7 @@ def index_qualys_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qualys_get_serialize( + _param = self._index_qqids_get_serialize( page=page, limit=limit, cursor=cursor, @@ -238663,7 +238663,7 @@ def index_qualys_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination", '404': "str", '500': "str", } @@ -238674,7 +238674,7 @@ def index_qualys_get_without_preload_content( return response_data.response - def _index_qualys_get_serialize( + def _index_qqids_get_serialize( self, page, limit, @@ -238842,7 +238842,7 @@ def _index_qualys_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/qualys', + resource_path='/v3/index/qqids', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -238859,7 +238859,7 @@ def _index_qualys_get_serialize( @validate_call - def index_qualys_qids_get( + def index_qualcomm_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -238897,10 +238897,10 @@ def index_qualys_qids_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination: - """Return vulnerability data stored in index \"qualys-qids\" + ) -> RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination: + """Return vulnerability data stored in index \"qualcomm\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys-qids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QID ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys-qids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys-qids?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualcomm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualcomm Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualcomm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualcomm?cursor=` :param page: set the page number of the response :type page: int @@ -238972,7 +238972,7 @@ def index_qualys_qids_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qualys_qids_get_serialize( + _param = self._index_qualcomm_get_serialize( page=page, limit=limit, cursor=cursor, @@ -239004,7 +239004,7 @@ def index_qualys_qids_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination", '404': "str", '500': "str", } @@ -239020,7 +239020,7 @@ def index_qualys_qids_get( @validate_call - def index_qualys_qids_get_with_http_info( + def index_qualcomm_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -239058,10 +239058,10 @@ def index_qualys_qids_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination]: - """Return vulnerability data stored in index \"qualys-qids\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination]: + """Return vulnerability data stored in index \"qualcomm\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys-qids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QID ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys-qids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys-qids?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualcomm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualcomm Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualcomm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualcomm?cursor=` :param page: set the page number of the response :type page: int @@ -239133,7 +239133,7 @@ def index_qualys_qids_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qualys_qids_get_serialize( + _param = self._index_qualcomm_get_serialize( page=page, limit=limit, cursor=cursor, @@ -239165,7 +239165,7 @@ def index_qualys_qids_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination", '404': "str", '500': "str", } @@ -239181,7 +239181,7 @@ def index_qualys_qids_get_with_http_info( @validate_call - def index_qualys_qids_get_without_preload_content( + def index_qualcomm_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -239220,9 +239220,9 @@ def index_qualys_qids_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"qualys-qids\" + """Return vulnerability data stored in index \"qualcomm\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys-qids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QID ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys-qids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys-qids?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualcomm index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualcomm Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualcomm?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualcomm?cursor=` :param page: set the page number of the response :type page: int @@ -239294,7 +239294,7 @@ def index_qualys_qids_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qualys_qids_get_serialize( + _param = self._index_qualcomm_get_serialize( page=page, limit=limit, cursor=cursor, @@ -239326,7 +239326,7 @@ def index_qualys_qids_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination", '404': "str", '500': "str", } @@ -239337,7 +239337,7 @@ def index_qualys_qids_get_without_preload_content( return response_data.response - def _index_qualys_qids_get_serialize( + def _index_qualcomm_get_serialize( self, page, limit, @@ -239505,7 +239505,7 @@ def _index_qualys_qids_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/qualys-qids', + resource_path='/v3/index/qualcomm', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -239522,7 +239522,7 @@ def _index_qualys_qids_get_serialize( @validate_call - def index_qubes_qsb_get( + def index_qualys_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -239560,10 +239560,10 @@ def index_qubes_qsb_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination: - """Return vulnerability data stored in index \"qubes-qsb\" + ) -> RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination: + """Return vulnerability data stored in index \"qualys\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qubes-qsb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qubes Security Bulletin ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qubes-qsb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qubes-qsb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys?cursor=` :param page: set the page number of the response :type page: int @@ -239635,7 +239635,7 @@ def index_qubes_qsb_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qubes_qsb_get_serialize( + _param = self._index_qualys_get_serialize( page=page, limit=limit, cursor=cursor, @@ -239667,7 +239667,7 @@ def index_qubes_qsb_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination", '404': "str", '500': "str", } @@ -239683,7 +239683,7 @@ def index_qubes_qsb_get( @validate_call - def index_qubes_qsb_get_with_http_info( + def index_qualys_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -239721,10 +239721,10 @@ def index_qubes_qsb_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination]: - """Return vulnerability data stored in index \"qubes-qsb\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination]: + """Return vulnerability data stored in index \"qualys\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qubes-qsb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qubes Security Bulletin ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qubes-qsb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qubes-qsb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys?cursor=` :param page: set the page number of the response :type page: int @@ -239796,7 +239796,7 @@ def index_qubes_qsb_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qubes_qsb_get_serialize( + _param = self._index_qualys_get_serialize( page=page, limit=limit, cursor=cursor, @@ -239828,7 +239828,7 @@ def index_qubes_qsb_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination", '404': "str", '500': "str", } @@ -239844,7 +239844,7 @@ def index_qubes_qsb_get_with_http_info( @validate_call - def index_qubes_qsb_get_without_preload_content( + def index_qualys_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -239883,9 +239883,9 @@ def index_qubes_qsb_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"qubes-qsb\" + """Return vulnerability data stored in index \"qualys\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qubes-qsb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qubes Security Bulletin ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qubes-qsb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qubes-qsb?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys?cursor=` :param page: set the page number of the response :type page: int @@ -239957,7 +239957,7 @@ def index_qubes_qsb_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_qubes_qsb_get_serialize( + _param = self._index_qualys_get_serialize( page=page, limit=limit, cursor=cursor, @@ -239989,7 +239989,7 @@ def index_qubes_qsb_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination", '404': "str", '500': "str", } @@ -240000,7 +240000,7 @@ def index_qubes_qsb_get_without_preload_content( return response_data.response - def _index_qubes_qsb_get_serialize( + def _index_qualys_get_serialize( self, page, limit, @@ -240168,7 +240168,7 @@ def _index_qubes_qsb_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/qubes-qsb', + resource_path='/v3/index/qualys', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -240185,7 +240185,7 @@ def _index_qubes_qsb_get_serialize( @validate_call - def index_ransomware_get( + def index_qualys_qids_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -240223,10 +240223,10 @@ def index_ransomware_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination: - """Return vulnerability data stored in index \"ransomware\" + ) -> RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination: + """Return vulnerability data stored in index \"qualys-qids\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ransomware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Ransomware ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ransomware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ransomware?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys-qids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QID ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys-qids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys-qids?cursor=` :param page: set the page number of the response :type page: int @@ -240298,7 +240298,7 @@ def index_ransomware_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ransomware_get_serialize( + _param = self._index_qualys_qids_get_serialize( page=page, limit=limit, cursor=cursor, @@ -240330,7 +240330,7 @@ def index_ransomware_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination", '404': "str", '500': "str", } @@ -240346,7 +240346,7 @@ def index_ransomware_get( @validate_call - def index_ransomware_get_with_http_info( + def index_qualys_qids_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -240384,10 +240384,10 @@ def index_ransomware_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination]: - """Return vulnerability data stored in index \"ransomware\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination]: + """Return vulnerability data stored in index \"qualys-qids\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ransomware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Ransomware ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ransomware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ransomware?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys-qids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QID ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys-qids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys-qids?cursor=` :param page: set the page number of the response :type page: int @@ -240459,7 +240459,7 @@ def index_ransomware_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ransomware_get_serialize( + _param = self._index_qualys_qids_get_serialize( page=page, limit=limit, cursor=cursor, @@ -240491,7 +240491,7 @@ def index_ransomware_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination", '404': "str", '500': "str", } @@ -240507,7 +240507,7 @@ def index_ransomware_get_with_http_info( @validate_call - def index_ransomware_get_without_preload_content( + def index_qualys_qids_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -240546,9 +240546,9 @@ def index_ransomware_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ransomware\" + """Return vulnerability data stored in index \"qualys-qids\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ransomware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Ransomware ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ransomware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ransomware?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qualys-qids index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qualys QID ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qualys-qids?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qualys-qids?cursor=` :param page: set the page number of the response :type page: int @@ -240620,7 +240620,7 @@ def index_ransomware_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ransomware_get_serialize( + _param = self._index_qualys_qids_get_serialize( page=page, limit=limit, cursor=cursor, @@ -240652,7 +240652,7 @@ def index_ransomware_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination", '404': "str", '500': "str", } @@ -240663,7 +240663,7 @@ def index_ransomware_get_without_preload_content( return response_data.response - def _index_ransomware_get_serialize( + def _index_qualys_qids_get_serialize( self, page, limit, @@ -240831,7 +240831,7 @@ def _index_ransomware_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ransomware', + resource_path='/v3/index/qualys-qids', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -240848,7 +240848,7 @@ def _index_ransomware_get_serialize( @validate_call - def index_red_lion_get( + def index_qubes_qsb_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -240886,10 +240886,10 @@ def index_red_lion_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination: - """Return vulnerability data stored in index \"red-lion\" + ) -> RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination: + """Return vulnerability data stored in index \"qubes-qsb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the red-lion index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Red-Lion Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/red-lion?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/red-lion?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qubes-qsb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qubes Security Bulletin ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qubes-qsb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qubes-qsb?cursor=` :param page: set the page number of the response :type page: int @@ -240961,7 +240961,7 @@ def index_red_lion_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_red_lion_get_serialize( + _param = self._index_qubes_qsb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -240993,7 +240993,7 @@ def index_red_lion_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination", '404': "str", '500': "str", } @@ -241009,7 +241009,7 @@ def index_red_lion_get( @validate_call - def index_red_lion_get_with_http_info( + def index_qubes_qsb_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -241047,10 +241047,10 @@ def index_red_lion_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination]: - """Return vulnerability data stored in index \"red-lion\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination]: + """Return vulnerability data stored in index \"qubes-qsb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the red-lion index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Red-Lion Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/red-lion?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/red-lion?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qubes-qsb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qubes Security Bulletin ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qubes-qsb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qubes-qsb?cursor=` :param page: set the page number of the response :type page: int @@ -241122,7 +241122,7 @@ def index_red_lion_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_red_lion_get_serialize( + _param = self._index_qubes_qsb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -241154,7 +241154,7 @@ def index_red_lion_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination", '404': "str", '500': "str", } @@ -241170,7 +241170,7 @@ def index_red_lion_get_with_http_info( @validate_call - def index_red_lion_get_without_preload_content( + def index_qubes_qsb_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -241209,9 +241209,9 @@ def index_red_lion_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"red-lion\" + """Return vulnerability data stored in index \"qubes-qsb\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the red-lion index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Red-Lion Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/red-lion?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/red-lion?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the qubes-qsb index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Qubes Security Bulletin ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/qubes-qsb?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/qubes-qsb?cursor=` :param page: set the page number of the response :type page: int @@ -241283,7 +241283,7 @@ def index_red_lion_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_red_lion_get_serialize( + _param = self._index_qubes_qsb_get_serialize( page=page, limit=limit, cursor=cursor, @@ -241315,7 +241315,7 @@ def index_red_lion_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination", '404': "str", '500': "str", } @@ -241326,7 +241326,7 @@ def index_red_lion_get_without_preload_content( return response_data.response - def _index_red_lion_get_serialize( + def _index_qubes_qsb_get_serialize( self, page, limit, @@ -241494,7 +241494,7 @@ def _index_red_lion_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/red-lion', + resource_path='/v3/index/qubes-qsb', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -241511,7 +241511,7 @@ def _index_red_lion_get_serialize( @validate_call - def index_redhat_cves_get( + def index_ransomware_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -241549,10 +241549,10 @@ def index_redhat_cves_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination: - """Return vulnerability data stored in index \"redhat-cves\" + ) -> RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination: + """Return vulnerability data stored in index \"ransomware\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the redhat-cves index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CSAF data for redhat ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/redhat-cves?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/redhat-cves?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ransomware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Ransomware ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ransomware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ransomware?cursor=` :param page: set the page number of the response :type page: int @@ -241624,7 +241624,7 @@ def index_redhat_cves_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_redhat_cves_get_serialize( + _param = self._index_ransomware_get_serialize( page=page, limit=limit, cursor=cursor, @@ -241656,7 +241656,7 @@ def index_redhat_cves_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination", '404': "str", '500': "str", } @@ -241672,7 +241672,7 @@ def index_redhat_cves_get( @validate_call - def index_redhat_cves_get_with_http_info( + def index_ransomware_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -241710,10 +241710,10 @@ def index_redhat_cves_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination]: - """Return vulnerability data stored in index \"redhat-cves\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination]: + """Return vulnerability data stored in index \"ransomware\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the redhat-cves index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CSAF data for redhat ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/redhat-cves?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/redhat-cves?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ransomware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Ransomware ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ransomware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ransomware?cursor=` :param page: set the page number of the response :type page: int @@ -241785,7 +241785,7 @@ def index_redhat_cves_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_redhat_cves_get_serialize( + _param = self._index_ransomware_get_serialize( page=page, limit=limit, cursor=cursor, @@ -241817,7 +241817,7 @@ def index_redhat_cves_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination", '404': "str", '500': "str", } @@ -241833,7 +241833,7 @@ def index_redhat_cves_get_with_http_info( @validate_call - def index_redhat_cves_get_without_preload_content( + def index_ransomware_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -241872,9 +241872,9 @@ def index_redhat_cves_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"redhat-cves\" + """Return vulnerability data stored in index \"ransomware\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the redhat-cves index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CSAF data for redhat ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/redhat-cves?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/redhat-cves?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ransomware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Ransomware ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ransomware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ransomware?cursor=` :param page: set the page number of the response :type page: int @@ -241946,7 +241946,7 @@ def index_redhat_cves_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_redhat_cves_get_serialize( + _param = self._index_ransomware_get_serialize( page=page, limit=limit, cursor=cursor, @@ -241978,7 +241978,7 @@ def index_redhat_cves_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination", '404': "str", '500': "str", } @@ -241989,7 +241989,7 @@ def index_redhat_cves_get_without_preload_content( return response_data.response - def _index_redhat_cves_get_serialize( + def _index_ransomware_get_serialize( self, page, limit, @@ -242157,7 +242157,7 @@ def _index_redhat_cves_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/redhat-cves', + resource_path='/v3/index/ransomware', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -242174,7 +242174,7 @@ def _index_redhat_cves_get_serialize( @validate_call - def index_redhat_get( + def index_red_lion_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -242212,10 +242212,10 @@ def index_redhat_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination: - """Return vulnerability data stored in index \"redhat\" + ) -> RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination: + """Return vulnerability data stored in index \"red-lion\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the redhat index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Red Hat Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/redhat?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/redhat?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the red-lion index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Red-Lion Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/red-lion?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/red-lion?cursor=` :param page: set the page number of the response :type page: int @@ -242287,7 +242287,7 @@ def index_redhat_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_redhat_get_serialize( + _param = self._index_red_lion_get_serialize( page=page, limit=limit, cursor=cursor, @@ -242319,7 +242319,7 @@ def index_redhat_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination", '404': "str", '500': "str", } @@ -242335,7 +242335,7 @@ def index_redhat_get( @validate_call - def index_redhat_get_with_http_info( + def index_red_lion_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -242373,10 +242373,10 @@ def index_redhat_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination]: - """Return vulnerability data stored in index \"redhat\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination]: + """Return vulnerability data stored in index \"red-lion\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the redhat index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Red Hat Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/redhat?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/redhat?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the red-lion index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Red-Lion Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/red-lion?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/red-lion?cursor=` :param page: set the page number of the response :type page: int @@ -242448,7 +242448,7 @@ def index_redhat_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_redhat_get_serialize( + _param = self._index_red_lion_get_serialize( page=page, limit=limit, cursor=cursor, @@ -242480,7 +242480,7 @@ def index_redhat_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination", '404': "str", '500': "str", } @@ -242496,7 +242496,7 @@ def index_redhat_get_with_http_info( @validate_call - def index_redhat_get_without_preload_content( + def index_red_lion_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -242535,9 +242535,9 @@ def index_redhat_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"redhat\" + """Return vulnerability data stored in index \"red-lion\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the redhat index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Red Hat Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/redhat?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/redhat?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the red-lion index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Red-Lion Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/red-lion?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/red-lion?cursor=` :param page: set the page number of the response :type page: int @@ -242609,7 +242609,7 @@ def index_redhat_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_redhat_get_serialize( + _param = self._index_red_lion_get_serialize( page=page, limit=limit, cursor=cursor, @@ -242641,7 +242641,7 @@ def index_redhat_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination", '404': "str", '500': "str", } @@ -242652,7 +242652,7 @@ def index_redhat_get_without_preload_content( return response_data.response - def _index_redhat_get_serialize( + def _index_red_lion_get_serialize( self, page, limit, @@ -242820,7 +242820,7 @@ def _index_redhat_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/redhat', + resource_path='/v3/index/red-lion', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -242837,7 +242837,7 @@ def _index_redhat_get_serialize( @validate_call - def index_renesas_get( + def index_redhat_cves_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -242875,10 +242875,10 @@ def index_renesas_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination: - """Return vulnerability data stored in index \"renesas\" + ) -> RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination: + """Return vulnerability data stored in index \"redhat-cves\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the renesas index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Renesas Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/renesas?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/renesas?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the redhat-cves index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CSAF data for redhat ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/redhat-cves?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/redhat-cves?cursor=` :param page: set the page number of the response :type page: int @@ -242950,7 +242950,7 @@ def index_renesas_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_renesas_get_serialize( + _param = self._index_redhat_cves_get_serialize( page=page, limit=limit, cursor=cursor, @@ -242982,7 +242982,7 @@ def index_renesas_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination", '404': "str", '500': "str", } @@ -242998,7 +242998,7 @@ def index_renesas_get( @validate_call - def index_renesas_get_with_http_info( + def index_redhat_cves_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -243036,10 +243036,10 @@ def index_renesas_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination]: - """Return vulnerability data stored in index \"renesas\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination]: + """Return vulnerability data stored in index \"redhat-cves\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the renesas index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Renesas Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/renesas?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/renesas?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the redhat-cves index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CSAF data for redhat ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/redhat-cves?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/redhat-cves?cursor=` :param page: set the page number of the response :type page: int @@ -243111,7 +243111,7 @@ def index_renesas_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_renesas_get_serialize( + _param = self._index_redhat_cves_get_serialize( page=page, limit=limit, cursor=cursor, @@ -243143,7 +243143,7 @@ def index_renesas_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination", '404': "str", '500': "str", } @@ -243159,7 +243159,7 @@ def index_renesas_get_with_http_info( @validate_call - def index_renesas_get_without_preload_content( + def index_redhat_cves_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -243198,9 +243198,9 @@ def index_renesas_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"renesas\" + """Return vulnerability data stored in index \"redhat-cves\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the renesas index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Renesas Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/renesas?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/renesas?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the redhat-cves index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CSAF data for redhat ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/redhat-cves?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/redhat-cves?cursor=` :param page: set the page number of the response :type page: int @@ -243272,7 +243272,7 @@ def index_renesas_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_renesas_get_serialize( + _param = self._index_redhat_cves_get_serialize( page=page, limit=limit, cursor=cursor, @@ -243304,7 +243304,7 @@ def index_renesas_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination", '404': "str", '500': "str", } @@ -243315,7 +243315,7 @@ def index_renesas_get_without_preload_content( return response_data.response - def _index_renesas_get_serialize( + def _index_redhat_cves_get_serialize( self, page, limit, @@ -243483,7 +243483,7 @@ def _index_renesas_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/renesas', + resource_path='/v3/index/redhat-cves', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -243500,7 +243500,7 @@ def _index_renesas_get_serialize( @validate_call - def index_revive_get( + def index_redhat_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -243538,10 +243538,10 @@ def index_revive_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination: - """Return vulnerability data stored in index \"revive\" + ) -> RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination: + """Return vulnerability data stored in index \"redhat\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the revive index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Revive Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/revive?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/revive?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the redhat index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Red Hat Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/redhat?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/redhat?cursor=` :param page: set the page number of the response :type page: int @@ -243613,7 +243613,7 @@ def index_revive_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_revive_get_serialize( + _param = self._index_redhat_get_serialize( page=page, limit=limit, cursor=cursor, @@ -243645,7 +243645,7 @@ def index_revive_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination", '404': "str", '500': "str", } @@ -243661,7 +243661,7 @@ def index_revive_get( @validate_call - def index_revive_get_with_http_info( + def index_redhat_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -243699,10 +243699,10 @@ def index_revive_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination]: - """Return vulnerability data stored in index \"revive\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination]: + """Return vulnerability data stored in index \"redhat\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the revive index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Revive Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/revive?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/revive?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the redhat index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Red Hat Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/redhat?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/redhat?cursor=` :param page: set the page number of the response :type page: int @@ -243774,7 +243774,7 @@ def index_revive_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_revive_get_serialize( + _param = self._index_redhat_get_serialize( page=page, limit=limit, cursor=cursor, @@ -243806,7 +243806,7 @@ def index_revive_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination", '404': "str", '500': "str", } @@ -243822,7 +243822,7 @@ def index_revive_get_with_http_info( @validate_call - def index_revive_get_without_preload_content( + def index_redhat_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -243861,9 +243861,9 @@ def index_revive_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"revive\" + """Return vulnerability data stored in index \"redhat\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the revive index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Revive Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/revive?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/revive?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the redhat index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Red Hat Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/redhat?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/redhat?cursor=` :param page: set the page number of the response :type page: int @@ -243935,7 +243935,7 @@ def index_revive_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_revive_get_serialize( + _param = self._index_redhat_get_serialize( page=page, limit=limit, cursor=cursor, @@ -243967,7 +243967,7 @@ def index_revive_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination", '404': "str", '500': "str", } @@ -243978,7 +243978,7 @@ def index_revive_get_without_preload_content( return response_data.response - def _index_revive_get_serialize( + def _index_redhat_get_serialize( self, page, limit, @@ -244146,7 +244146,7 @@ def _index_revive_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/revive', + resource_path='/v3/index/redhat', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -244163,7 +244163,7 @@ def _index_revive_get_serialize( @validate_call - def index_roche_get( + def index_renesas_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -244201,10 +244201,10 @@ def index_roche_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination: - """Return vulnerability data stored in index \"roche\" + ) -> RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination: + """Return vulnerability data stored in index \"renesas\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the roche index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Roche Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/roche?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/roche?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the renesas index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Renesas Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/renesas?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/renesas?cursor=` :param page: set the page number of the response :type page: int @@ -244276,7 +244276,7 @@ def index_roche_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_roche_get_serialize( + _param = self._index_renesas_get_serialize( page=page, limit=limit, cursor=cursor, @@ -244308,7 +244308,7 @@ def index_roche_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination", '404': "str", '500': "str", } @@ -244324,7 +244324,7 @@ def index_roche_get( @validate_call - def index_roche_get_with_http_info( + def index_renesas_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -244362,10 +244362,10 @@ def index_roche_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination]: - """Return vulnerability data stored in index \"roche\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination]: + """Return vulnerability data stored in index \"renesas\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the roche index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Roche Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/roche?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/roche?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the renesas index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Renesas Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/renesas?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/renesas?cursor=` :param page: set the page number of the response :type page: int @@ -244437,7 +244437,7 @@ def index_roche_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_roche_get_serialize( + _param = self._index_renesas_get_serialize( page=page, limit=limit, cursor=cursor, @@ -244469,7 +244469,7 @@ def index_roche_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination", '404': "str", '500': "str", } @@ -244485,7 +244485,7 @@ def index_roche_get_with_http_info( @validate_call - def index_roche_get_without_preload_content( + def index_renesas_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -244524,9 +244524,9 @@ def index_roche_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"roche\" + """Return vulnerability data stored in index \"renesas\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the roche index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Roche Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/roche?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/roche?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the renesas index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Renesas Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/renesas?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/renesas?cursor=` :param page: set the page number of the response :type page: int @@ -244598,7 +244598,7 @@ def index_roche_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_roche_get_serialize( + _param = self._index_renesas_get_serialize( page=page, limit=limit, cursor=cursor, @@ -244630,7 +244630,7 @@ def index_roche_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination", '404': "str", '500': "str", } @@ -244641,7 +244641,7 @@ def index_roche_get_without_preload_content( return response_data.response - def _index_roche_get_serialize( + def _index_renesas_get_serialize( self, page, limit, @@ -244809,7 +244809,7 @@ def _index_roche_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/roche', + resource_path='/v3/index/renesas', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -244826,7 +244826,7 @@ def _index_roche_get_serialize( @validate_call - def index_rockwell_get( + def index_revive_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -244864,10 +244864,10 @@ def index_rockwell_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination: - """Return vulnerability data stored in index \"rockwell\" + ) -> RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination: + """Return vulnerability data stored in index \"revive\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rockwell index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rockwell Automation Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rockwell?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rockwell?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the revive index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Revive Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/revive?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/revive?cursor=` :param page: set the page number of the response :type page: int @@ -244939,7 +244939,7 @@ def index_rockwell_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rockwell_get_serialize( + _param = self._index_revive_get_serialize( page=page, limit=limit, cursor=cursor, @@ -244971,7 +244971,7 @@ def index_rockwell_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination", '404': "str", '500': "str", } @@ -244987,7 +244987,7 @@ def index_rockwell_get( @validate_call - def index_rockwell_get_with_http_info( + def index_revive_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -245025,10 +245025,10 @@ def index_rockwell_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination]: - """Return vulnerability data stored in index \"rockwell\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination]: + """Return vulnerability data stored in index \"revive\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rockwell index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rockwell Automation Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rockwell?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rockwell?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the revive index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Revive Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/revive?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/revive?cursor=` :param page: set the page number of the response :type page: int @@ -245100,7 +245100,7 @@ def index_rockwell_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rockwell_get_serialize( + _param = self._index_revive_get_serialize( page=page, limit=limit, cursor=cursor, @@ -245132,7 +245132,7 @@ def index_rockwell_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination", '404': "str", '500': "str", } @@ -245148,7 +245148,7 @@ def index_rockwell_get_with_http_info( @validate_call - def index_rockwell_get_without_preload_content( + def index_revive_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -245187,9 +245187,9 @@ def index_rockwell_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"rockwell\" + """Return vulnerability data stored in index \"revive\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rockwell index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rockwell Automation Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rockwell?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rockwell?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the revive index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Revive Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/revive?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/revive?cursor=` :param page: set the page number of the response :type page: int @@ -245261,7 +245261,7 @@ def index_rockwell_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rockwell_get_serialize( + _param = self._index_revive_get_serialize( page=page, limit=limit, cursor=cursor, @@ -245293,7 +245293,7 @@ def index_rockwell_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination", '404': "str", '500': "str", } @@ -245304,7 +245304,7 @@ def index_rockwell_get_without_preload_content( return response_data.response - def _index_rockwell_get_serialize( + def _index_revive_get_serialize( self, page, limit, @@ -245472,7 +245472,7 @@ def _index_rockwell_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/rockwell', + resource_path='/v3/index/revive', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -245489,7 +245489,7 @@ def _index_rockwell_get_serialize( @validate_call - def index_rocky_errata_get( + def index_roche_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -245527,10 +245527,10 @@ def index_rocky_errata_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination: - """Return vulnerability data stored in index \"rocky-errata\" + ) -> RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination: + """Return vulnerability data stored in index \"roche\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky-errata index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Errata ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-errata?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky-errata?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the roche index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Roche Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/roche?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/roche?cursor=` :param page: set the page number of the response :type page: int @@ -245602,7 +245602,7 @@ def index_rocky_errata_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rocky_errata_get_serialize( + _param = self._index_roche_get_serialize( page=page, limit=limit, cursor=cursor, @@ -245634,7 +245634,7 @@ def index_rocky_errata_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination", '404': "str", '500': "str", } @@ -245650,7 +245650,7 @@ def index_rocky_errata_get( @validate_call - def index_rocky_errata_get_with_http_info( + def index_roche_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -245688,10 +245688,10 @@ def index_rocky_errata_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination]: - """Return vulnerability data stored in index \"rocky-errata\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination]: + """Return vulnerability data stored in index \"roche\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky-errata index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Errata ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-errata?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky-errata?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the roche index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Roche Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/roche?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/roche?cursor=` :param page: set the page number of the response :type page: int @@ -245763,7 +245763,7 @@ def index_rocky_errata_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rocky_errata_get_serialize( + _param = self._index_roche_get_serialize( page=page, limit=limit, cursor=cursor, @@ -245795,7 +245795,7 @@ def index_rocky_errata_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination", '404': "str", '500': "str", } @@ -245811,7 +245811,7 @@ def index_rocky_errata_get_with_http_info( @validate_call - def index_rocky_errata_get_without_preload_content( + def index_roche_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -245850,9 +245850,9 @@ def index_rocky_errata_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"rocky-errata\" + """Return vulnerability data stored in index \"roche\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky-errata index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Errata ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-errata?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky-errata?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the roche index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Roche Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/roche?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/roche?cursor=` :param page: set the page number of the response :type page: int @@ -245924,7 +245924,7 @@ def index_rocky_errata_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rocky_errata_get_serialize( + _param = self._index_roche_get_serialize( page=page, limit=limit, cursor=cursor, @@ -245956,7 +245956,7 @@ def index_rocky_errata_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination", '404': "str", '500': "str", } @@ -245967,7 +245967,7 @@ def index_rocky_errata_get_without_preload_content( return response_data.response - def _index_rocky_errata_get_serialize( + def _index_roche_get_serialize( self, page, limit, @@ -246135,7 +246135,7 @@ def _index_rocky_errata_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/rocky-errata', + resource_path='/v3/index/roche', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -246152,7 +246152,7 @@ def _index_rocky_errata_get_serialize( @validate_call - def index_rocky_get( + def index_rockwell_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -246190,10 +246190,10 @@ def index_rocky_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiUpdatePaginatePagination: - """Return vulnerability data stored in index \"rocky\" + ) -> RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination: + """Return vulnerability data stored in index \"rockwell\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Linux Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rockwell index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rockwell Automation Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rockwell?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rockwell?cursor=` :param page: set the page number of the response :type page: int @@ -246265,7 +246265,7 @@ def index_rocky_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rocky_get_serialize( + _param = self._index_rockwell_get_serialize( page=page, limit=limit, cursor=cursor, @@ -246297,7 +246297,7 @@ def index_rocky_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiUpdatePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination", '404': "str", '500': "str", } @@ -246313,7 +246313,7 @@ def index_rocky_get( @validate_call - def index_rocky_get_with_http_info( + def index_rockwell_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -246351,10 +246351,10 @@ def index_rocky_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiUpdatePaginatePagination]: - """Return vulnerability data stored in index \"rocky\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination]: + """Return vulnerability data stored in index \"rockwell\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Linux Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rockwell index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rockwell Automation Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rockwell?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rockwell?cursor=` :param page: set the page number of the response :type page: int @@ -246426,7 +246426,7 @@ def index_rocky_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rocky_get_serialize( + _param = self._index_rockwell_get_serialize( page=page, limit=limit, cursor=cursor, @@ -246458,7 +246458,7 @@ def index_rocky_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiUpdatePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination", '404': "str", '500': "str", } @@ -246474,7 +246474,7 @@ def index_rocky_get_with_http_info( @validate_call - def index_rocky_get_without_preload_content( + def index_rockwell_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -246513,9 +246513,9 @@ def index_rocky_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"rocky\" + """Return vulnerability data stored in index \"rockwell\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Linux Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rockwell index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rockwell Automation Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rockwell?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rockwell?cursor=` :param page: set the page number of the response :type page: int @@ -246587,7 +246587,7 @@ def index_rocky_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rocky_get_serialize( + _param = self._index_rockwell_get_serialize( page=page, limit=limit, cursor=cursor, @@ -246619,7 +246619,7 @@ def index_rocky_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiUpdatePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination", '404': "str", '500': "str", } @@ -246630,7 +246630,7 @@ def index_rocky_get_without_preload_content( return response_data.response - def _index_rocky_get_serialize( + def _index_rockwell_get_serialize( self, page, limit, @@ -246798,7 +246798,7 @@ def _index_rocky_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/rocky', + resource_path='/v3/index/rockwell', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -246815,7 +246815,7 @@ def _index_rocky_get_serialize( @validate_call - def index_rocky_purls_get( + def index_rocky_errata_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -246853,10 +246853,10 @@ def index_rocky_purls_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination: - """Return vulnerability data stored in index \"rocky-purls\" + ) -> RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination: + """Return vulnerability data stored in index \"rocky-errata\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky-purls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Purls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-purls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky-purls?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky-errata index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Errata ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-errata?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky-errata?cursor=` :param page: set the page number of the response :type page: int @@ -246928,7 +246928,7 @@ def index_rocky_purls_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rocky_purls_get_serialize( + _param = self._index_rocky_errata_get_serialize( page=page, limit=limit, cursor=cursor, @@ -246960,7 +246960,7 @@ def index_rocky_purls_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination", '404': "str", '500': "str", } @@ -246976,7 +246976,7 @@ def index_rocky_purls_get( @validate_call - def index_rocky_purls_get_with_http_info( + def index_rocky_errata_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -247014,10 +247014,10 @@ def index_rocky_purls_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination]: - """Return vulnerability data stored in index \"rocky-purls\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination]: + """Return vulnerability data stored in index \"rocky-errata\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky-purls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Purls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-purls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky-purls?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky-errata index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Errata ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-errata?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky-errata?cursor=` :param page: set the page number of the response :type page: int @@ -247089,7 +247089,7 @@ def index_rocky_purls_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rocky_purls_get_serialize( + _param = self._index_rocky_errata_get_serialize( page=page, limit=limit, cursor=cursor, @@ -247121,7 +247121,7 @@ def index_rocky_purls_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination", '404': "str", '500': "str", } @@ -247137,7 +247137,7 @@ def index_rocky_purls_get_with_http_info( @validate_call - def index_rocky_purls_get_without_preload_content( + def index_rocky_errata_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -247176,9 +247176,9 @@ def index_rocky_purls_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"rocky-purls\" + """Return vulnerability data stored in index \"rocky-errata\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky-purls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Purls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-purls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky-purls?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky-errata index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Errata ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-errata?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky-errata?cursor=` :param page: set the page number of the response :type page: int @@ -247250,7 +247250,7 @@ def index_rocky_purls_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rocky_purls_get_serialize( + _param = self._index_rocky_errata_get_serialize( page=page, limit=limit, cursor=cursor, @@ -247282,7 +247282,7 @@ def index_rocky_purls_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination", '404': "str", '500': "str", } @@ -247293,7 +247293,7 @@ def index_rocky_purls_get_without_preload_content( return response_data.response - def _index_rocky_purls_get_serialize( + def _index_rocky_errata_get_serialize( self, page, limit, @@ -247461,7 +247461,7 @@ def _index_rocky_purls_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/rocky-purls', + resource_path='/v3/index/rocky-errata', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -247478,7 +247478,7 @@ def _index_rocky_purls_get_serialize( @validate_call - def index_rsync_get( + def index_rocky_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -247516,10 +247516,10 @@ def index_rsync_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination: - """Return vulnerability data stored in index \"rsync\" + ) -> RenderResponseWithMetadataArrayApiUpdatePaginatePagination: + """Return vulnerability data stored in index \"rocky\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rsync index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rsync Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rsync?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rsync?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Linux Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky?cursor=` :param page: set the page number of the response :type page: int @@ -247591,7 +247591,7 @@ def index_rsync_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rsync_get_serialize( + _param = self._index_rocky_get_serialize( page=page, limit=limit, cursor=cursor, @@ -247623,7 +247623,7 @@ def index_rsync_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiUpdatePaginatePagination", '404': "str", '500': "str", } @@ -247639,7 +247639,7 @@ def index_rsync_get( @validate_call - def index_rsync_get_with_http_info( + def index_rocky_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -247677,10 +247677,10 @@ def index_rsync_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination]: - """Return vulnerability data stored in index \"rsync\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiUpdatePaginatePagination]: + """Return vulnerability data stored in index \"rocky\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rsync index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rsync Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rsync?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rsync?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Linux Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky?cursor=` :param page: set the page number of the response :type page: int @@ -247752,7 +247752,7 @@ def index_rsync_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rsync_get_serialize( + _param = self._index_rocky_get_serialize( page=page, limit=limit, cursor=cursor, @@ -247784,7 +247784,7 @@ def index_rsync_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiUpdatePaginatePagination", '404': "str", '500': "str", } @@ -247800,7 +247800,7 @@ def index_rsync_get_with_http_info( @validate_call - def index_rsync_get_without_preload_content( + def index_rocky_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -247839,9 +247839,9 @@ def index_rsync_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"rsync\" + """Return vulnerability data stored in index \"rocky\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rsync index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rsync Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rsync?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rsync?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Linux Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky?cursor=` :param page: set the page number of the response :type page: int @@ -247913,7 +247913,7 @@ def index_rsync_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rsync_get_serialize( + _param = self._index_rocky_get_serialize( page=page, limit=limit, cursor=cursor, @@ -247945,7 +247945,7 @@ def index_rsync_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiUpdatePaginatePagination", '404': "str", '500': "str", } @@ -247956,7 +247956,7 @@ def index_rsync_get_without_preload_content( return response_data.response - def _index_rsync_get_serialize( + def _index_rocky_get_serialize( self, page, limit, @@ -248124,7 +248124,7 @@ def _index_rsync_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/rsync', + resource_path='/v3/index/rocky', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -248141,7 +248141,7 @@ def _index_rsync_get_serialize( @validate_call - def index_ruckus_get( + def index_rocky_purls_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -248179,10 +248179,10 @@ def index_ruckus_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination: - """Return vulnerability data stored in index \"ruckus\" + ) -> RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination: + """Return vulnerability data stored in index \"rocky-purls\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ruckus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ruckus Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ruckus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ruckus?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky-purls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Purls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-purls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky-purls?cursor=` :param page: set the page number of the response :type page: int @@ -248254,7 +248254,7 @@ def index_ruckus_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ruckus_get_serialize( + _param = self._index_rocky_purls_get_serialize( page=page, limit=limit, cursor=cursor, @@ -248286,7 +248286,7 @@ def index_ruckus_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination", + '200': "RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination", '404': "str", '500': "str", } @@ -248302,7 +248302,7 @@ def index_ruckus_get( @validate_call - def index_ruckus_get_with_http_info( + def index_rocky_purls_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -248340,10 +248340,10 @@ def index_ruckus_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination]: - """Return vulnerability data stored in index \"ruckus\" + ) -> ApiResponse[RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination]: + """Return vulnerability data stored in index \"rocky-purls\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ruckus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ruckus Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ruckus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ruckus?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky-purls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Purls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-purls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky-purls?cursor=` :param page: set the page number of the response :type page: int @@ -248415,7 +248415,7 @@ def index_ruckus_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ruckus_get_serialize( + _param = self._index_rocky_purls_get_serialize( page=page, limit=limit, cursor=cursor, @@ -248447,7 +248447,7 @@ def index_ruckus_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination", + '200': "RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination", '404': "str", '500': "str", } @@ -248463,7 +248463,7 @@ def index_ruckus_get_with_http_info( @validate_call - def index_ruckus_get_without_preload_content( + def index_rocky_purls_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -248502,9 +248502,9 @@ def index_ruckus_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ruckus\" + """Return vulnerability data stored in index \"rocky-purls\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ruckus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ruckus Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ruckus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ruckus?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rocky-purls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rocky Purls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-purls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rocky-purls?cursor=` :param page: set the page number of the response :type page: int @@ -248576,7 +248576,7 @@ def index_ruckus_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ruckus_get_serialize( + _param = self._index_rocky_purls_get_serialize( page=page, limit=limit, cursor=cursor, @@ -248608,7 +248608,7 @@ def index_ruckus_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination", + '200': "RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination", '404': "str", '500': "str", } @@ -248619,7 +248619,7 @@ def index_ruckus_get_without_preload_content( return response_data.response - def _index_ruckus_get_serialize( + def _index_rocky_purls_get_serialize( self, page, limit, @@ -248787,7 +248787,7 @@ def _index_ruckus_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ruckus', + resource_path='/v3/index/rocky-purls', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -248804,7 +248804,7 @@ def _index_ruckus_get_serialize( @validate_call - def index_rustsec_advisories_get( + def index_rsync_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -248842,10 +248842,10 @@ def index_rustsec_advisories_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"rustsec-advisories\" + ) -> RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination: + """Return vulnerability data stored in index \"rsync\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rustsec-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** RustSec Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rustsec-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rustsec-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rsync index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rsync Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rsync?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rsync?cursor=` :param page: set the page number of the response :type page: int @@ -248917,7 +248917,7 @@ def index_rustsec_advisories_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rustsec_advisories_get_serialize( + _param = self._index_rsync_get_serialize( page=page, limit=limit, cursor=cursor, @@ -248949,7 +248949,7 @@ def index_rustsec_advisories_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination", '404': "str", '500': "str", } @@ -248965,7 +248965,7 @@ def index_rustsec_advisories_get( @validate_call - def index_rustsec_advisories_get_with_http_info( + def index_rsync_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -249003,10 +249003,10 @@ def index_rustsec_advisories_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"rustsec-advisories\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination]: + """Return vulnerability data stored in index \"rsync\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rustsec-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** RustSec Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rustsec-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rustsec-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rsync index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rsync Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rsync?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rsync?cursor=` :param page: set the page number of the response :type page: int @@ -249078,7 +249078,7 @@ def index_rustsec_advisories_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rustsec_advisories_get_serialize( + _param = self._index_rsync_get_serialize( page=page, limit=limit, cursor=cursor, @@ -249110,7 +249110,7 @@ def index_rustsec_advisories_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination", '404': "str", '500': "str", } @@ -249126,7 +249126,7 @@ def index_rustsec_advisories_get_with_http_info( @validate_call - def index_rustsec_advisories_get_without_preload_content( + def index_rsync_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -249165,9 +249165,9 @@ def index_rustsec_advisories_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"rustsec-advisories\" + """Return vulnerability data stored in index \"rsync\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rustsec-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** RustSec Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rustsec-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rustsec-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rsync index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Rsync Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rsync?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rsync?cursor=` :param page: set the page number of the response :type page: int @@ -249239,7 +249239,7 @@ def index_rustsec_advisories_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_rustsec_advisories_get_serialize( + _param = self._index_rsync_get_serialize( page=page, limit=limit, cursor=cursor, @@ -249271,7 +249271,7 @@ def index_rustsec_advisories_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination", '404': "str", '500': "str", } @@ -249282,7 +249282,7 @@ def index_rustsec_advisories_get_without_preload_content( return response_data.response - def _index_rustsec_advisories_get_serialize( + def _index_rsync_get_serialize( self, page, limit, @@ -249450,7 +249450,7 @@ def _index_rustsec_advisories_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/rustsec-advisories', + resource_path='/v3/index/rsync', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -249467,7 +249467,7 @@ def _index_rustsec_advisories_get_serialize( @validate_call - def index_sacert_get( + def index_ruckus_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -249505,10 +249505,10 @@ def index_sacert_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"sacert\" + ) -> RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination: + """Return vulnerability data stored in index \"ruckus\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sacert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Saudi CERT ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sacert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sacert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ruckus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ruckus Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ruckus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ruckus?cursor=` :param page: set the page number of the response :type page: int @@ -249580,7 +249580,7 @@ def index_sacert_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sacert_get_serialize( + _param = self._index_ruckus_get_serialize( page=page, limit=limit, cursor=cursor, @@ -249612,7 +249612,7 @@ def index_sacert_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination", '404': "str", '500': "str", } @@ -249628,7 +249628,7 @@ def index_sacert_get( @validate_call - def index_sacert_get_with_http_info( + def index_ruckus_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -249666,10 +249666,10 @@ def index_sacert_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"sacert\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination]: + """Return vulnerability data stored in index \"ruckus\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sacert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Saudi CERT ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sacert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sacert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ruckus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ruckus Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ruckus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ruckus?cursor=` :param page: set the page number of the response :type page: int @@ -249741,7 +249741,7 @@ def index_sacert_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sacert_get_serialize( + _param = self._index_ruckus_get_serialize( page=page, limit=limit, cursor=cursor, @@ -249773,7 +249773,7 @@ def index_sacert_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination", '404': "str", '500': "str", } @@ -249789,7 +249789,7 @@ def index_sacert_get_with_http_info( @validate_call - def index_sacert_get_without_preload_content( + def index_ruckus_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -249828,9 +249828,9 @@ def index_sacert_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sacert\" + """Return vulnerability data stored in index \"ruckus\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sacert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Saudi CERT ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sacert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sacert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ruckus index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ruckus Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ruckus?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ruckus?cursor=` :param page: set the page number of the response :type page: int @@ -249902,7 +249902,7 @@ def index_sacert_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sacert_get_serialize( + _param = self._index_ruckus_get_serialize( page=page, limit=limit, cursor=cursor, @@ -249934,7 +249934,7 @@ def index_sacert_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination", '404': "str", '500': "str", } @@ -249945,7 +249945,7 @@ def index_sacert_get_without_preload_content( return response_data.response - def _index_sacert_get_serialize( + def _index_ruckus_get_serialize( self, page, limit, @@ -250113,7 +250113,7 @@ def _index_sacert_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sacert', + resource_path='/v3/index/ruckus', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -250130,7 +250130,7 @@ def _index_sacert_get_serialize( @validate_call - def index_safran_get( + def index_rustsec_advisories_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -250168,10 +250168,10 @@ def index_safran_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination: - """Return vulnerability data stored in index \"safran\" + ) -> RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"rustsec-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the safran index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Safran Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/safran?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/safran?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rustsec-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** RustSec Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rustsec-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rustsec-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -250243,7 +250243,7 @@ def index_safran_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_safran_get_serialize( + _param = self._index_rustsec_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -250275,7 +250275,7 @@ def index_safran_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -250291,7 +250291,7 @@ def index_safran_get( @validate_call - def index_safran_get_with_http_info( + def index_rustsec_advisories_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -250329,10 +250329,10 @@ def index_safran_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination]: - """Return vulnerability data stored in index \"safran\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"rustsec-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the safran index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Safran Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/safran?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/safran?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rustsec-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** RustSec Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rustsec-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rustsec-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -250404,7 +250404,7 @@ def index_safran_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_safran_get_serialize( + _param = self._index_rustsec_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -250436,7 +250436,7 @@ def index_safran_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -250452,7 +250452,7 @@ def index_safran_get_with_http_info( @validate_call - def index_safran_get_without_preload_content( + def index_rustsec_advisories_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -250491,9 +250491,9 @@ def index_safran_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"safran\" + """Return vulnerability data stored in index \"rustsec-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the safran index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Safran Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/safran?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/safran?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the rustsec-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** RustSec Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/rustsec-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/rustsec-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -250565,7 +250565,7 @@ def index_safran_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_safran_get_serialize( + _param = self._index_rustsec_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -250597,7 +250597,7 @@ def index_safran_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -250608,7 +250608,7 @@ def index_safran_get_without_preload_content( return response_data.response - def _index_safran_get_serialize( + def _index_rustsec_advisories_get_serialize( self, page, limit, @@ -250776,7 +250776,7 @@ def _index_safran_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/safran', + resource_path='/v3/index/rustsec-advisories', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -250793,7 +250793,7 @@ def _index_safran_get_serialize( @validate_call - def index_saint_get( + def index_sacert_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -250831,10 +250831,10 @@ def index_saint_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination: - """Return vulnerability data stored in index \"saint\" + ) -> RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"sacert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the saint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SAINT Exploits ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/saint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/saint?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sacert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Saudi CERT ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sacert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sacert?cursor=` :param page: set the page number of the response :type page: int @@ -250906,7 +250906,7 @@ def index_saint_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_saint_get_serialize( + _param = self._index_sacert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -250938,7 +250938,7 @@ def index_saint_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -250954,7 +250954,7 @@ def index_saint_get( @validate_call - def index_saint_get_with_http_info( + def index_sacert_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -250992,10 +250992,10 @@ def index_saint_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination]: - """Return vulnerability data stored in index \"saint\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"sacert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the saint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SAINT Exploits ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/saint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/saint?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sacert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Saudi CERT ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sacert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sacert?cursor=` :param page: set the page number of the response :type page: int @@ -251067,7 +251067,7 @@ def index_saint_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_saint_get_serialize( + _param = self._index_sacert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -251099,7 +251099,7 @@ def index_saint_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -251115,7 +251115,7 @@ def index_saint_get_with_http_info( @validate_call - def index_saint_get_without_preload_content( + def index_sacert_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -251154,9 +251154,9 @@ def index_saint_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"saint\" + """Return vulnerability data stored in index \"sacert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the saint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SAINT Exploits ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/saint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/saint?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sacert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Saudi CERT ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sacert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sacert?cursor=` :param page: set the page number of the response :type page: int @@ -251228,7 +251228,7 @@ def index_saint_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_saint_get_serialize( + _param = self._index_sacert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -251260,7 +251260,7 @@ def index_saint_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -251271,7 +251271,7 @@ def index_saint_get_without_preload_content( return response_data.response - def _index_saint_get_serialize( + def _index_sacert_get_serialize( self, page, limit, @@ -251439,7 +251439,7 @@ def _index_saint_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/saint', + resource_path='/v3/index/sacert', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -251456,7 +251456,7 @@ def _index_saint_get_serialize( @validate_call - def index_salesforce_get( + def index_safran_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -251494,10 +251494,10 @@ def index_salesforce_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination: - """Return vulnerability data stored in index \"salesforce\" + ) -> RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination: + """Return vulnerability data stored in index \"safran\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the salesforce index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SalesForce Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/salesforce?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/salesforce?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the safran index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Safran Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/safran?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/safran?cursor=` :param page: set the page number of the response :type page: int @@ -251569,7 +251569,7 @@ def index_salesforce_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_salesforce_get_serialize( + _param = self._index_safran_get_serialize( page=page, limit=limit, cursor=cursor, @@ -251601,7 +251601,7 @@ def index_salesforce_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination", '404': "str", '500': "str", } @@ -251617,7 +251617,7 @@ def index_salesforce_get( @validate_call - def index_salesforce_get_with_http_info( + def index_safran_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -251655,10 +251655,10 @@ def index_salesforce_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination]: - """Return vulnerability data stored in index \"salesforce\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination]: + """Return vulnerability data stored in index \"safran\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the salesforce index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SalesForce Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/salesforce?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/salesforce?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the safran index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Safran Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/safran?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/safran?cursor=` :param page: set the page number of the response :type page: int @@ -251730,7 +251730,7 @@ def index_salesforce_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_salesforce_get_serialize( + _param = self._index_safran_get_serialize( page=page, limit=limit, cursor=cursor, @@ -251762,7 +251762,7 @@ def index_salesforce_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination", '404': "str", '500': "str", } @@ -251778,7 +251778,7 @@ def index_salesforce_get_with_http_info( @validate_call - def index_salesforce_get_without_preload_content( + def index_safran_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -251817,9 +251817,9 @@ def index_salesforce_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"salesforce\" + """Return vulnerability data stored in index \"safran\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the salesforce index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SalesForce Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/salesforce?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/salesforce?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the safran index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Safran Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/safran?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/safran?cursor=` :param page: set the page number of the response :type page: int @@ -251891,7 +251891,7 @@ def index_salesforce_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_salesforce_get_serialize( + _param = self._index_safran_get_serialize( page=page, limit=limit, cursor=cursor, @@ -251923,7 +251923,7 @@ def index_salesforce_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination", '404': "str", '500': "str", } @@ -251934,7 +251934,7 @@ def index_salesforce_get_without_preload_content( return response_data.response - def _index_salesforce_get_serialize( + def _index_safran_get_serialize( self, page, limit, @@ -252102,7 +252102,7 @@ def _index_salesforce_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/salesforce', + resource_path='/v3/index/safran', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -252119,7 +252119,7 @@ def _index_salesforce_get_serialize( @validate_call - def index_samba_get( + def index_saint_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -252157,10 +252157,10 @@ def index_samba_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination: - """Return vulnerability data stored in index \"samba\" + ) -> RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination: + """Return vulnerability data stored in index \"saint\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the samba index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Samba Security Releases ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/samba?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/samba?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the saint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SAINT Exploits ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/saint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/saint?cursor=` :param page: set the page number of the response :type page: int @@ -252232,7 +252232,7 @@ def index_samba_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_samba_get_serialize( + _param = self._index_saint_get_serialize( page=page, limit=limit, cursor=cursor, @@ -252264,7 +252264,7 @@ def index_samba_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination", '404': "str", '500': "str", } @@ -252280,7 +252280,7 @@ def index_samba_get( @validate_call - def index_samba_get_with_http_info( + def index_saint_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -252318,10 +252318,10 @@ def index_samba_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination]: - """Return vulnerability data stored in index \"samba\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination]: + """Return vulnerability data stored in index \"saint\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the samba index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Samba Security Releases ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/samba?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/samba?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the saint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SAINT Exploits ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/saint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/saint?cursor=` :param page: set the page number of the response :type page: int @@ -252393,7 +252393,7 @@ def index_samba_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_samba_get_serialize( + _param = self._index_saint_get_serialize( page=page, limit=limit, cursor=cursor, @@ -252425,7 +252425,7 @@ def index_samba_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination", '404': "str", '500': "str", } @@ -252441,7 +252441,7 @@ def index_samba_get_with_http_info( @validate_call - def index_samba_get_without_preload_content( + def index_saint_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -252480,9 +252480,9 @@ def index_samba_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"samba\" + """Return vulnerability data stored in index \"saint\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the samba index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Samba Security Releases ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/samba?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/samba?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the saint index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SAINT Exploits ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/saint?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/saint?cursor=` :param page: set the page number of the response :type page: int @@ -252554,7 +252554,7 @@ def index_samba_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_samba_get_serialize( + _param = self._index_saint_get_serialize( page=page, limit=limit, cursor=cursor, @@ -252586,7 +252586,7 @@ def index_samba_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination", '404': "str", '500': "str", } @@ -252597,7 +252597,7 @@ def index_samba_get_without_preload_content( return response_data.response - def _index_samba_get_serialize( + def _index_saint_get_serialize( self, page, limit, @@ -252765,7 +252765,7 @@ def _index_samba_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/samba', + resource_path='/v3/index/saint', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -252782,7 +252782,7 @@ def _index_samba_get_serialize( @validate_call - def index_sandisk_get( + def index_salesforce_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -252820,10 +252820,10 @@ def index_sandisk_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination: - """Return vulnerability data stored in index \"sandisk\" + ) -> RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination: + """Return vulnerability data stored in index \"salesforce\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sandisk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sandisk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sandisk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sandisk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the salesforce index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SalesForce Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/salesforce?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/salesforce?cursor=` :param page: set the page number of the response :type page: int @@ -252895,7 +252895,7 @@ def index_sandisk_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sandisk_get_serialize( + _param = self._index_salesforce_get_serialize( page=page, limit=limit, cursor=cursor, @@ -252927,7 +252927,7 @@ def index_sandisk_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination", '404': "str", '500': "str", } @@ -252943,7 +252943,7 @@ def index_sandisk_get( @validate_call - def index_sandisk_get_with_http_info( + def index_salesforce_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -252981,10 +252981,10 @@ def index_sandisk_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination]: - """Return vulnerability data stored in index \"sandisk\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination]: + """Return vulnerability data stored in index \"salesforce\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sandisk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sandisk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sandisk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sandisk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the salesforce index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SalesForce Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/salesforce?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/salesforce?cursor=` :param page: set the page number of the response :type page: int @@ -253056,7 +253056,7 @@ def index_sandisk_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sandisk_get_serialize( + _param = self._index_salesforce_get_serialize( page=page, limit=limit, cursor=cursor, @@ -253088,7 +253088,7 @@ def index_sandisk_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination", '404': "str", '500': "str", } @@ -253104,7 +253104,7 @@ def index_sandisk_get_with_http_info( @validate_call - def index_sandisk_get_without_preload_content( + def index_salesforce_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -253143,9 +253143,9 @@ def index_sandisk_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sandisk\" + """Return vulnerability data stored in index \"salesforce\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sandisk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sandisk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sandisk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sandisk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the salesforce index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SalesForce Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/salesforce?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/salesforce?cursor=` :param page: set the page number of the response :type page: int @@ -253217,7 +253217,7 @@ def index_sandisk_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sandisk_get_serialize( + _param = self._index_salesforce_get_serialize( page=page, limit=limit, cursor=cursor, @@ -253249,7 +253249,7 @@ def index_sandisk_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination", '404': "str", '500': "str", } @@ -253260,7 +253260,7 @@ def index_sandisk_get_without_preload_content( return response_data.response - def _index_sandisk_get_serialize( + def _index_salesforce_get_serialize( self, page, limit, @@ -253428,7 +253428,7 @@ def _index_sandisk_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sandisk', + resource_path='/v3/index/salesforce', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -253445,7 +253445,7 @@ def _index_sandisk_get_serialize( @validate_call - def index_sans_dshield_get( + def index_samba_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -253483,10 +253483,10 @@ def index_sans_dshield_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination: - """Return vulnerability data stored in index \"sans-dshield\" + ) -> RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination: + """Return vulnerability data stored in index \"samba\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sans-dshield index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SANS DShield Honeypot Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sans-dshield?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sans-dshield?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the samba index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Samba Security Releases ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/samba?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/samba?cursor=` :param page: set the page number of the response :type page: int @@ -253558,7 +253558,7 @@ def index_sans_dshield_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sans_dshield_get_serialize( + _param = self._index_samba_get_serialize( page=page, limit=limit, cursor=cursor, @@ -253590,7 +253590,7 @@ def index_sans_dshield_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination", '404': "str", '500': "str", } @@ -253606,7 +253606,7 @@ def index_sans_dshield_get( @validate_call - def index_sans_dshield_get_with_http_info( + def index_samba_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -253644,10 +253644,10 @@ def index_sans_dshield_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination]: - """Return vulnerability data stored in index \"sans-dshield\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination]: + """Return vulnerability data stored in index \"samba\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sans-dshield index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SANS DShield Honeypot Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sans-dshield?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sans-dshield?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the samba index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Samba Security Releases ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/samba?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/samba?cursor=` :param page: set the page number of the response :type page: int @@ -253719,7 +253719,7 @@ def index_sans_dshield_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sans_dshield_get_serialize( + _param = self._index_samba_get_serialize( page=page, limit=limit, cursor=cursor, @@ -253751,7 +253751,7 @@ def index_sans_dshield_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination", '404': "str", '500': "str", } @@ -253767,7 +253767,7 @@ def index_sans_dshield_get_with_http_info( @validate_call - def index_sans_dshield_get_without_preload_content( + def index_samba_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -253806,9 +253806,9 @@ def index_sans_dshield_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sans-dshield\" + """Return vulnerability data stored in index \"samba\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sans-dshield index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SANS DShield Honeypot Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sans-dshield?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sans-dshield?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the samba index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Samba Security Releases ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/samba?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/samba?cursor=` :param page: set the page number of the response :type page: int @@ -253880,7 +253880,7 @@ def index_sans_dshield_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sans_dshield_get_serialize( + _param = self._index_samba_get_serialize( page=page, limit=limit, cursor=cursor, @@ -253912,7 +253912,7 @@ def index_sans_dshield_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination", '404': "str", '500': "str", } @@ -253923,7 +253923,7 @@ def index_sans_dshield_get_without_preload_content( return response_data.response - def _index_sans_dshield_get_serialize( + def _index_samba_get_serialize( self, page, limit, @@ -254091,7 +254091,7 @@ def _index_sans_dshield_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sans-dshield', + resource_path='/v3/index/samba', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -254108,7 +254108,7 @@ def _index_sans_dshield_get_serialize( @validate_call - def index_sap_get( + def index_sandisk_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -254146,10 +254146,10 @@ def index_sap_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination: - """Return vulnerability data stored in index \"sap\" + ) -> RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination: + """Return vulnerability data stored in index \"sandisk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SAP Security Patch Days ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sap?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sandisk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sandisk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sandisk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sandisk?cursor=` :param page: set the page number of the response :type page: int @@ -254221,7 +254221,7 @@ def index_sap_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sap_get_serialize( + _param = self._index_sandisk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -254253,7 +254253,7 @@ def index_sap_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination", '404': "str", '500': "str", } @@ -254269,7 +254269,7 @@ def index_sap_get( @validate_call - def index_sap_get_with_http_info( + def index_sandisk_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -254307,10 +254307,10 @@ def index_sap_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination]: - """Return vulnerability data stored in index \"sap\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination]: + """Return vulnerability data stored in index \"sandisk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SAP Security Patch Days ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sap?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sandisk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sandisk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sandisk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sandisk?cursor=` :param page: set the page number of the response :type page: int @@ -254382,7 +254382,7 @@ def index_sap_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sap_get_serialize( + _param = self._index_sandisk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -254414,7 +254414,7 @@ def index_sap_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination", '404': "str", '500': "str", } @@ -254430,7 +254430,7 @@ def index_sap_get_with_http_info( @validate_call - def index_sap_get_without_preload_content( + def index_sandisk_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -254469,9 +254469,9 @@ def index_sap_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sap\" + """Return vulnerability data stored in index \"sandisk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SAP Security Patch Days ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sap?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sandisk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sandisk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sandisk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sandisk?cursor=` :param page: set the page number of the response :type page: int @@ -254543,7 +254543,7 @@ def index_sap_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sap_get_serialize( + _param = self._index_sandisk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -254575,7 +254575,7 @@ def index_sap_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination", '404': "str", '500': "str", } @@ -254586,7 +254586,7 @@ def index_sap_get_without_preload_content( return response_data.response - def _index_sap_get_serialize( + def _index_sandisk_get_serialize( self, page, limit, @@ -254754,7 +254754,7 @@ def _index_sap_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sap', + resource_path='/v3/index/sandisk', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -254771,7 +254771,7 @@ def _index_sap_get_serialize( @validate_call - def index_schneider_electric_get( + def index_sans_dshield_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -254809,10 +254809,10 @@ def index_schneider_electric_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"schneider-electric\" + ) -> RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination: + """Return vulnerability data stored in index \"sans-dshield\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the schneider-electric index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schneider Electric Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/schneider-electric?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/schneider-electric?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sans-dshield index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SANS DShield Honeypot Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sans-dshield?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sans-dshield?cursor=` :param page: set the page number of the response :type page: int @@ -254884,7 +254884,7 @@ def index_schneider_electric_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_schneider_electric_get_serialize( + _param = self._index_sans_dshield_get_serialize( page=page, limit=limit, cursor=cursor, @@ -254916,7 +254916,7 @@ def index_schneider_electric_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination", '404': "str", '500': "str", } @@ -254932,7 +254932,7 @@ def index_schneider_electric_get( @validate_call - def index_schneider_electric_get_with_http_info( + def index_sans_dshield_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -254970,10 +254970,10 @@ def index_schneider_electric_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"schneider-electric\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination]: + """Return vulnerability data stored in index \"sans-dshield\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the schneider-electric index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schneider Electric Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/schneider-electric?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/schneider-electric?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sans-dshield index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SANS DShield Honeypot Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sans-dshield?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sans-dshield?cursor=` :param page: set the page number of the response :type page: int @@ -255045,7 +255045,7 @@ def index_schneider_electric_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_schneider_electric_get_serialize( + _param = self._index_sans_dshield_get_serialize( page=page, limit=limit, cursor=cursor, @@ -255077,7 +255077,7 @@ def index_schneider_electric_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination", '404': "str", '500': "str", } @@ -255093,7 +255093,7 @@ def index_schneider_electric_get_with_http_info( @validate_call - def index_schneider_electric_get_without_preload_content( + def index_sans_dshield_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -255132,9 +255132,9 @@ def index_schneider_electric_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"schneider-electric\" + """Return vulnerability data stored in index \"sans-dshield\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the schneider-electric index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schneider Electric Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/schneider-electric?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/schneider-electric?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sans-dshield index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SANS DShield Honeypot Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sans-dshield?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sans-dshield?cursor=` :param page: set the page number of the response :type page: int @@ -255206,7 +255206,7 @@ def index_schneider_electric_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_schneider_electric_get_serialize( + _param = self._index_sans_dshield_get_serialize( page=page, limit=limit, cursor=cursor, @@ -255238,7 +255238,7 @@ def index_schneider_electric_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination", '404': "str", '500': "str", } @@ -255249,7 +255249,7 @@ def index_schneider_electric_get_without_preload_content( return response_data.response - def _index_schneider_electric_get_serialize( + def _index_sans_dshield_get_serialize( self, page, limit, @@ -255417,7 +255417,7 @@ def _index_schneider_electric_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/schneider-electric', + resource_path='/v3/index/sans-dshield', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -255434,7 +255434,7 @@ def _index_schneider_electric_get_serialize( @validate_call - def index_schutzwerk_get( + def index_sap_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -255472,10 +255472,10 @@ def index_schutzwerk_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination: - """Return vulnerability data stored in index \"schutzwerk\" + ) -> RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination: + """Return vulnerability data stored in index \"sap\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the schutzwerk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schutzwerk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/schutzwerk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/schutzwerk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SAP Security Patch Days ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sap?cursor=` :param page: set the page number of the response :type page: int @@ -255547,7 +255547,7 @@ def index_schutzwerk_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_schutzwerk_get_serialize( + _param = self._index_sap_get_serialize( page=page, limit=limit, cursor=cursor, @@ -255579,7 +255579,7 @@ def index_schutzwerk_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination", '404': "str", '500': "str", } @@ -255595,7 +255595,7 @@ def index_schutzwerk_get( @validate_call - def index_schutzwerk_get_with_http_info( + def index_sap_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -255633,10 +255633,10 @@ def index_schutzwerk_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination]: - """Return vulnerability data stored in index \"schutzwerk\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination]: + """Return vulnerability data stored in index \"sap\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the schutzwerk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schutzwerk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/schutzwerk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/schutzwerk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SAP Security Patch Days ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sap?cursor=` :param page: set the page number of the response :type page: int @@ -255708,7 +255708,7 @@ def index_schutzwerk_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_schutzwerk_get_serialize( + _param = self._index_sap_get_serialize( page=page, limit=limit, cursor=cursor, @@ -255740,7 +255740,7 @@ def index_schutzwerk_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination", '404': "str", '500': "str", } @@ -255756,7 +255756,7 @@ def index_schutzwerk_get_with_http_info( @validate_call - def index_schutzwerk_get_without_preload_content( + def index_sap_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -255795,9 +255795,9 @@ def index_schutzwerk_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"schutzwerk\" + """Return vulnerability data stored in index \"sap\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the schutzwerk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schutzwerk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/schutzwerk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/schutzwerk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sap index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SAP Security Patch Days ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sap?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sap?cursor=` :param page: set the page number of the response :type page: int @@ -255869,7 +255869,7 @@ def index_schutzwerk_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_schutzwerk_get_serialize( + _param = self._index_sap_get_serialize( page=page, limit=limit, cursor=cursor, @@ -255901,7 +255901,7 @@ def index_schutzwerk_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination", '404': "str", '500': "str", } @@ -255912,7 +255912,7 @@ def index_schutzwerk_get_without_preload_content( return response_data.response - def _index_schutzwerk_get_serialize( + def _index_sap_get_serialize( self, page, limit, @@ -256080,7 +256080,7 @@ def _index_schutzwerk_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/schutzwerk', + resource_path='/v3/index/sap', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -256097,7 +256097,7 @@ def _index_schutzwerk_get_serialize( @validate_call - def index_sec_consult_get( + def index_schneider_electric_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -256135,10 +256135,10 @@ def index_sec_consult_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination: - """Return vulnerability data stored in index \"sec-consult\" + ) -> RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"schneider-electric\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sec-consult index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SEC Consult Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sec-consult?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sec-consult?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the schneider-electric index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schneider Electric Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/schneider-electric?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/schneider-electric?cursor=` :param page: set the page number of the response :type page: int @@ -256210,7 +256210,7 @@ def index_sec_consult_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sec_consult_get_serialize( + _param = self._index_schneider_electric_get_serialize( page=page, limit=limit, cursor=cursor, @@ -256242,7 +256242,7 @@ def index_sec_consult_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -256258,7 +256258,7 @@ def index_sec_consult_get( @validate_call - def index_sec_consult_get_with_http_info( + def index_schneider_electric_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -256296,10 +256296,10 @@ def index_sec_consult_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination]: - """Return vulnerability data stored in index \"sec-consult\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"schneider-electric\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sec-consult index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SEC Consult Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sec-consult?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sec-consult?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the schneider-electric index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schneider Electric Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/schneider-electric?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/schneider-electric?cursor=` :param page: set the page number of the response :type page: int @@ -256371,7 +256371,7 @@ def index_sec_consult_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sec_consult_get_serialize( + _param = self._index_schneider_electric_get_serialize( page=page, limit=limit, cursor=cursor, @@ -256403,7 +256403,7 @@ def index_sec_consult_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -256419,7 +256419,7 @@ def index_sec_consult_get_with_http_info( @validate_call - def index_sec_consult_get_without_preload_content( + def index_schneider_electric_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -256458,9 +256458,9 @@ def index_sec_consult_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sec-consult\" + """Return vulnerability data stored in index \"schneider-electric\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sec-consult index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SEC Consult Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sec-consult?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sec-consult?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the schneider-electric index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schneider Electric Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/schneider-electric?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/schneider-electric?cursor=` :param page: set the page number of the response :type page: int @@ -256532,7 +256532,7 @@ def index_sec_consult_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sec_consult_get_serialize( + _param = self._index_schneider_electric_get_serialize( page=page, limit=limit, cursor=cursor, @@ -256564,7 +256564,7 @@ def index_sec_consult_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -256575,7 +256575,7 @@ def index_sec_consult_get_without_preload_content( return response_data.response - def _index_sec_consult_get_serialize( + def _index_schneider_electric_get_serialize( self, page, limit, @@ -256743,7 +256743,7 @@ def _index_sec_consult_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sec-consult', + resource_path='/v3/index/schneider-electric', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -256760,7 +256760,7 @@ def _index_sec_consult_get_serialize( @validate_call - def index_securitylab_get( + def index_schutzwerk_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -256798,10 +256798,10 @@ def index_securitylab_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination: - """Return vulnerability data stored in index \"securitylab\" + ) -> RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination: + """Return vulnerability data stored in index \"schutzwerk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the securitylab index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Security Lab Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/securitylab?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/securitylab?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the schutzwerk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schutzwerk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/schutzwerk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/schutzwerk?cursor=` :param page: set the page number of the response :type page: int @@ -256873,7 +256873,7 @@ def index_securitylab_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_securitylab_get_serialize( + _param = self._index_schutzwerk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -256905,7 +256905,7 @@ def index_securitylab_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination", '404': "str", '500': "str", } @@ -256921,7 +256921,7 @@ def index_securitylab_get( @validate_call - def index_securitylab_get_with_http_info( + def index_schutzwerk_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -256959,10 +256959,10 @@ def index_securitylab_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination]: - """Return vulnerability data stored in index \"securitylab\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination]: + """Return vulnerability data stored in index \"schutzwerk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the securitylab index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Security Lab Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/securitylab?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/securitylab?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the schutzwerk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schutzwerk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/schutzwerk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/schutzwerk?cursor=` :param page: set the page number of the response :type page: int @@ -257034,7 +257034,7 @@ def index_securitylab_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_securitylab_get_serialize( + _param = self._index_schutzwerk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -257066,7 +257066,7 @@ def index_securitylab_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination", '404': "str", '500': "str", } @@ -257082,7 +257082,7 @@ def index_securitylab_get_with_http_info( @validate_call - def index_securitylab_get_without_preload_content( + def index_schutzwerk_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -257121,9 +257121,9 @@ def index_securitylab_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"securitylab\" + """Return vulnerability data stored in index \"schutzwerk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the securitylab index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Security Lab Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/securitylab?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/securitylab?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the schutzwerk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schutzwerk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/schutzwerk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/schutzwerk?cursor=` :param page: set the page number of the response :type page: int @@ -257195,7 +257195,7 @@ def index_securitylab_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_securitylab_get_serialize( + _param = self._index_schutzwerk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -257227,7 +257227,7 @@ def index_securitylab_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination", '404': "str", '500': "str", } @@ -257238,7 +257238,7 @@ def index_securitylab_get_without_preload_content( return response_data.response - def _index_securitylab_get_serialize( + def _index_schutzwerk_get_serialize( self, page, limit, @@ -257406,7 +257406,7 @@ def _index_securitylab_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/securitylab', + resource_path='/v3/index/schutzwerk', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -257423,7 +257423,7 @@ def _index_securitylab_get_serialize( @validate_call - def index_seebug_get( + def index_sec_consult_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -257461,10 +257461,10 @@ def index_seebug_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination: - """Return vulnerability data stored in index \"seebug\" + ) -> RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination: + """Return vulnerability data stored in index \"sec-consult\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the seebug index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Seebug Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/seebug?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/seebug?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sec-consult index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SEC Consult Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sec-consult?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sec-consult?cursor=` :param page: set the page number of the response :type page: int @@ -257536,7 +257536,7 @@ def index_seebug_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_seebug_get_serialize( + _param = self._index_sec_consult_get_serialize( page=page, limit=limit, cursor=cursor, @@ -257568,7 +257568,7 @@ def index_seebug_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination", '404': "str", '500': "str", } @@ -257584,7 +257584,7 @@ def index_seebug_get( @validate_call - def index_seebug_get_with_http_info( + def index_sec_consult_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -257622,10 +257622,10 @@ def index_seebug_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination]: - """Return vulnerability data stored in index \"seebug\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination]: + """Return vulnerability data stored in index \"sec-consult\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the seebug index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Seebug Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/seebug?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/seebug?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sec-consult index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SEC Consult Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sec-consult?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sec-consult?cursor=` :param page: set the page number of the response :type page: int @@ -257697,7 +257697,7 @@ def index_seebug_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_seebug_get_serialize( + _param = self._index_sec_consult_get_serialize( page=page, limit=limit, cursor=cursor, @@ -257729,7 +257729,7 @@ def index_seebug_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination", '404': "str", '500': "str", } @@ -257745,7 +257745,7 @@ def index_seebug_get_with_http_info( @validate_call - def index_seebug_get_without_preload_content( + def index_sec_consult_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -257784,9 +257784,9 @@ def index_seebug_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"seebug\" + """Return vulnerability data stored in index \"sec-consult\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the seebug index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Seebug Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/seebug?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/seebug?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sec-consult index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SEC Consult Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sec-consult?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sec-consult?cursor=` :param page: set the page number of the response :type page: int @@ -257858,7 +257858,7 @@ def index_seebug_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_seebug_get_serialize( + _param = self._index_sec_consult_get_serialize( page=page, limit=limit, cursor=cursor, @@ -257890,7 +257890,7 @@ def index_seebug_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination", '404': "str", '500': "str", } @@ -257901,7 +257901,7 @@ def index_seebug_get_without_preload_content( return response_data.response - def _index_seebug_get_serialize( + def _index_sec_consult_get_serialize( self, page, limit, @@ -258069,7 +258069,7 @@ def _index_seebug_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/seebug', + resource_path='/v3/index/sec-consult', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -258086,7 +258086,7 @@ def _index_seebug_get_serialize( @validate_call - def index_sel_get( + def index_securitylab_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -258124,10 +258124,10 @@ def index_sel_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySelPaginatePagination: - """Return vulnerability data stored in index \"sel\" + ) -> RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination: + """Return vulnerability data stored in index \"securitylab\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schweitzer Engineering Laboratories Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sel?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the securitylab index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Security Lab Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/securitylab?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/securitylab?cursor=` :param page: set the page number of the response :type page: int @@ -258199,7 +258199,7 @@ def index_sel_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sel_get_serialize( + _param = self._index_securitylab_get_serialize( page=page, limit=limit, cursor=cursor, @@ -258231,7 +258231,7 @@ def index_sel_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySelPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination", '404': "str", '500': "str", } @@ -258247,7 +258247,7 @@ def index_sel_get( @validate_call - def index_sel_get_with_http_info( + def index_securitylab_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -258285,10 +258285,10 @@ def index_sel_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySelPaginatePagination]: - """Return vulnerability data stored in index \"sel\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination]: + """Return vulnerability data stored in index \"securitylab\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schweitzer Engineering Laboratories Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sel?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the securitylab index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Security Lab Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/securitylab?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/securitylab?cursor=` :param page: set the page number of the response :type page: int @@ -258360,7 +258360,7 @@ def index_sel_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sel_get_serialize( + _param = self._index_securitylab_get_serialize( page=page, limit=limit, cursor=cursor, @@ -258392,7 +258392,7 @@ def index_sel_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySelPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination", '404': "str", '500': "str", } @@ -258408,7 +258408,7 @@ def index_sel_get_with_http_info( @validate_call - def index_sel_get_without_preload_content( + def index_securitylab_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -258447,9 +258447,9 @@ def index_sel_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sel\" + """Return vulnerability data stored in index \"securitylab\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schweitzer Engineering Laboratories Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sel?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the securitylab index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Security Lab Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/securitylab?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/securitylab?cursor=` :param page: set the page number of the response :type page: int @@ -258521,7 +258521,7 @@ def index_sel_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sel_get_serialize( + _param = self._index_securitylab_get_serialize( page=page, limit=limit, cursor=cursor, @@ -258553,7 +258553,7 @@ def index_sel_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySelPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination", '404': "str", '500': "str", } @@ -258564,7 +258564,7 @@ def index_sel_get_without_preload_content( return response_data.response - def _index_sel_get_serialize( + def _index_securitylab_get_serialize( self, page, limit, @@ -258732,7 +258732,7 @@ def _index_sel_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sel', + resource_path='/v3/index/securitylab', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -258749,7 +258749,7 @@ def _index_sel_get_serialize( @validate_call - def index_sentinelone_get( + def index_seebug_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -258787,10 +258787,10 @@ def index_sentinelone_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination: - """Return vulnerability data stored in index \"sentinelone\" + ) -> RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination: + """Return vulnerability data stored in index \"seebug\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sentinelone index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SentinelOne Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sentinelone?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sentinelone?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the seebug index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Seebug Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/seebug?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/seebug?cursor=` :param page: set the page number of the response :type page: int @@ -258862,7 +258862,7 @@ def index_sentinelone_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sentinelone_get_serialize( + _param = self._index_seebug_get_serialize( page=page, limit=limit, cursor=cursor, @@ -258894,7 +258894,7 @@ def index_sentinelone_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination", '404': "str", '500': "str", } @@ -258910,7 +258910,7 @@ def index_sentinelone_get( @validate_call - def index_sentinelone_get_with_http_info( + def index_seebug_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -258948,10 +258948,10 @@ def index_sentinelone_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination]: - """Return vulnerability data stored in index \"sentinelone\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination]: + """Return vulnerability data stored in index \"seebug\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sentinelone index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SentinelOne Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sentinelone?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sentinelone?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the seebug index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Seebug Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/seebug?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/seebug?cursor=` :param page: set the page number of the response :type page: int @@ -259023,7 +259023,7 @@ def index_sentinelone_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sentinelone_get_serialize( + _param = self._index_seebug_get_serialize( page=page, limit=limit, cursor=cursor, @@ -259055,7 +259055,7 @@ def index_sentinelone_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination", '404': "str", '500': "str", } @@ -259071,7 +259071,7 @@ def index_sentinelone_get_with_http_info( @validate_call - def index_sentinelone_get_without_preload_content( + def index_seebug_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -259110,9 +259110,9 @@ def index_sentinelone_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sentinelone\" + """Return vulnerability data stored in index \"seebug\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sentinelone index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SentinelOne Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sentinelone?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sentinelone?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the seebug index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Seebug Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/seebug?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/seebug?cursor=` :param page: set the page number of the response :type page: int @@ -259184,7 +259184,7 @@ def index_sentinelone_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sentinelone_get_serialize( + _param = self._index_seebug_get_serialize( page=page, limit=limit, cursor=cursor, @@ -259216,7 +259216,7 @@ def index_sentinelone_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination", '404': "str", '500': "str", } @@ -259227,7 +259227,7 @@ def index_sentinelone_get_without_preload_content( return response_data.response - def _index_sentinelone_get_serialize( + def _index_seebug_get_serialize( self, page, limit, @@ -259395,7 +259395,7 @@ def _index_sentinelone_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sentinelone', + resource_path='/v3/index/seebug', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -259412,7 +259412,7 @@ def _index_sentinelone_get_serialize( @validate_call - def index_servicenow_get( + def index_sel_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -259450,10 +259450,10 @@ def index_servicenow_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination: - """Return vulnerability data stored in index \"servicenow\" + ) -> RenderResponseWithMetadataArrayAdvisorySelPaginatePagination: + """Return vulnerability data stored in index \"sel\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the servicenow index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** ServiceNow CVE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/servicenow?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/servicenow?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schweitzer Engineering Laboratories Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sel?cursor=` :param page: set the page number of the response :type page: int @@ -259525,7 +259525,7 @@ def index_servicenow_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_servicenow_get_serialize( + _param = self._index_sel_get_serialize( page=page, limit=limit, cursor=cursor, @@ -259557,7 +259557,7 @@ def index_servicenow_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySelPaginatePagination", '404': "str", '500': "str", } @@ -259573,7 +259573,7 @@ def index_servicenow_get( @validate_call - def index_servicenow_get_with_http_info( + def index_sel_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -259611,10 +259611,10 @@ def index_servicenow_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination]: - """Return vulnerability data stored in index \"servicenow\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySelPaginatePagination]: + """Return vulnerability data stored in index \"sel\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the servicenow index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** ServiceNow CVE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/servicenow?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/servicenow?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schweitzer Engineering Laboratories Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sel?cursor=` :param page: set the page number of the response :type page: int @@ -259686,7 +259686,7 @@ def index_servicenow_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_servicenow_get_serialize( + _param = self._index_sel_get_serialize( page=page, limit=limit, cursor=cursor, @@ -259718,7 +259718,7 @@ def index_servicenow_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySelPaginatePagination", '404': "str", '500': "str", } @@ -259734,7 +259734,7 @@ def index_servicenow_get_with_http_info( @validate_call - def index_servicenow_get_without_preload_content( + def index_sel_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -259773,9 +259773,9 @@ def index_servicenow_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"servicenow\" + """Return vulnerability data stored in index \"sel\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the servicenow index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** ServiceNow CVE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/servicenow?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/servicenow?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sel index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Schweitzer Engineering Laboratories Security Notifications ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sel?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sel?cursor=` :param page: set the page number of the response :type page: int @@ -259847,7 +259847,7 @@ def index_servicenow_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_servicenow_get_serialize( + _param = self._index_sel_get_serialize( page=page, limit=limit, cursor=cursor, @@ -259879,7 +259879,7 @@ def index_servicenow_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySelPaginatePagination", '404': "str", '500': "str", } @@ -259890,7 +259890,7 @@ def index_servicenow_get_without_preload_content( return response_data.response - def _index_servicenow_get_serialize( + def _index_sel_get_serialize( self, page, limit, @@ -260058,7 +260058,7 @@ def _index_servicenow_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/servicenow', + resource_path='/v3/index/sel', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -260075,7 +260075,7 @@ def _index_servicenow_get_serialize( @validate_call - def index_shadowserver_exploited_get( + def index_sentinelone_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -260113,10 +260113,10 @@ def index_shadowserver_exploited_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination: - """Return vulnerability data stored in index \"shadowserver-exploited\" + ) -> RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination: + """Return vulnerability data stored in index \"sentinelone\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the shadowserver-exploited index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Shadowserver Foundation Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/shadowserver-exploited?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/shadowserver-exploited?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sentinelone index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SentinelOne Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sentinelone?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sentinelone?cursor=` :param page: set the page number of the response :type page: int @@ -260188,7 +260188,7 @@ def index_shadowserver_exploited_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_shadowserver_exploited_get_serialize( + _param = self._index_sentinelone_get_serialize( page=page, limit=limit, cursor=cursor, @@ -260220,7 +260220,7 @@ def index_shadowserver_exploited_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination", '404': "str", '500': "str", } @@ -260236,7 +260236,7 @@ def index_shadowserver_exploited_get( @validate_call - def index_shadowserver_exploited_get_with_http_info( + def index_sentinelone_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -260274,10 +260274,10 @@ def index_shadowserver_exploited_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination]: - """Return vulnerability data stored in index \"shadowserver-exploited\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination]: + """Return vulnerability data stored in index \"sentinelone\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the shadowserver-exploited index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Shadowserver Foundation Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/shadowserver-exploited?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/shadowserver-exploited?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sentinelone index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SentinelOne Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sentinelone?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sentinelone?cursor=` :param page: set the page number of the response :type page: int @@ -260349,7 +260349,7 @@ def index_shadowserver_exploited_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_shadowserver_exploited_get_serialize( + _param = self._index_sentinelone_get_serialize( page=page, limit=limit, cursor=cursor, @@ -260381,7 +260381,7 @@ def index_shadowserver_exploited_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination", '404': "str", '500': "str", } @@ -260397,7 +260397,7 @@ def index_shadowserver_exploited_get_with_http_info( @validate_call - def index_shadowserver_exploited_get_without_preload_content( + def index_sentinelone_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -260436,9 +260436,9 @@ def index_shadowserver_exploited_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"shadowserver-exploited\" + """Return vulnerability data stored in index \"sentinelone\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the shadowserver-exploited index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Shadowserver Foundation Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/shadowserver-exploited?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/shadowserver-exploited?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sentinelone index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SentinelOne Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sentinelone?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sentinelone?cursor=` :param page: set the page number of the response :type page: int @@ -260510,7 +260510,7 @@ def index_shadowserver_exploited_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_shadowserver_exploited_get_serialize( + _param = self._index_sentinelone_get_serialize( page=page, limit=limit, cursor=cursor, @@ -260542,7 +260542,7 @@ def index_shadowserver_exploited_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination", '404': "str", '500': "str", } @@ -260553,7 +260553,7 @@ def index_shadowserver_exploited_get_without_preload_content( return response_data.response - def _index_shadowserver_exploited_get_serialize( + def _index_sentinelone_get_serialize( self, page, limit, @@ -260721,7 +260721,7 @@ def _index_shadowserver_exploited_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/shadowserver-exploited', + resource_path='/v3/index/sentinelone', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -260738,7 +260738,7 @@ def _index_shadowserver_exploited_get_serialize( @validate_call - def index_shielder_get( + def index_servicenow_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -260776,10 +260776,10 @@ def index_shielder_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination: - """Return vulnerability data stored in index \"shielder\" + ) -> RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination: + """Return vulnerability data stored in index \"servicenow\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the shielder index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Shielder Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/shielder?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/shielder?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the servicenow index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** ServiceNow CVE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/servicenow?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/servicenow?cursor=` :param page: set the page number of the response :type page: int @@ -260851,7 +260851,7 @@ def index_shielder_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_shielder_get_serialize( + _param = self._index_servicenow_get_serialize( page=page, limit=limit, cursor=cursor, @@ -260883,7 +260883,7 @@ def index_shielder_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination", '404': "str", '500': "str", } @@ -260899,7 +260899,7 @@ def index_shielder_get( @validate_call - def index_shielder_get_with_http_info( + def index_servicenow_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -260937,10 +260937,10 @@ def index_shielder_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination]: - """Return vulnerability data stored in index \"shielder\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination]: + """Return vulnerability data stored in index \"servicenow\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the shielder index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Shielder Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/shielder?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/shielder?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the servicenow index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** ServiceNow CVE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/servicenow?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/servicenow?cursor=` :param page: set the page number of the response :type page: int @@ -261012,7 +261012,7 @@ def index_shielder_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_shielder_get_serialize( + _param = self._index_servicenow_get_serialize( page=page, limit=limit, cursor=cursor, @@ -261044,7 +261044,7 @@ def index_shielder_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination", '404': "str", '500': "str", } @@ -261060,7 +261060,7 @@ def index_shielder_get_with_http_info( @validate_call - def index_shielder_get_without_preload_content( + def index_servicenow_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -261099,9 +261099,9 @@ def index_shielder_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"shielder\" + """Return vulnerability data stored in index \"servicenow\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the shielder index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Shielder Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/shielder?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/shielder?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the servicenow index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** ServiceNow CVE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/servicenow?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/servicenow?cursor=` :param page: set the page number of the response :type page: int @@ -261173,7 +261173,7 @@ def index_shielder_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_shielder_get_serialize( + _param = self._index_servicenow_get_serialize( page=page, limit=limit, cursor=cursor, @@ -261205,7 +261205,7 @@ def index_shielder_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination", '404': "str", '500': "str", } @@ -261216,7 +261216,7 @@ def index_shielder_get_without_preload_content( return response_data.response - def _index_shielder_get_serialize( + def _index_servicenow_get_serialize( self, page, limit, @@ -261384,7 +261384,7 @@ def _index_shielder_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/shielder', + resource_path='/v3/index/servicenow', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -261401,7 +261401,7 @@ def _index_shielder_get_serialize( @validate_call - def index_sick_get( + def index_shadowserver_exploited_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -261439,10 +261439,10 @@ def index_sick_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySickPaginatePagination: - """Return vulnerability data stored in index \"sick\" + ) -> RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination: + """Return vulnerability data stored in index \"shadowserver-exploited\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sick index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SICK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sick?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sick?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the shadowserver-exploited index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Shadowserver Foundation Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/shadowserver-exploited?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/shadowserver-exploited?cursor=` :param page: set the page number of the response :type page: int @@ -261514,7 +261514,7 @@ def index_sick_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sick_get_serialize( + _param = self._index_shadowserver_exploited_get_serialize( page=page, limit=limit, cursor=cursor, @@ -261546,7 +261546,7 @@ def index_sick_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySickPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination", '404': "str", '500': "str", } @@ -261562,7 +261562,7 @@ def index_sick_get( @validate_call - def index_sick_get_with_http_info( + def index_shadowserver_exploited_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -261600,10 +261600,10 @@ def index_sick_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySickPaginatePagination]: - """Return vulnerability data stored in index \"sick\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination]: + """Return vulnerability data stored in index \"shadowserver-exploited\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sick index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SICK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sick?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sick?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the shadowserver-exploited index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Shadowserver Foundation Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/shadowserver-exploited?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/shadowserver-exploited?cursor=` :param page: set the page number of the response :type page: int @@ -261675,7 +261675,7 @@ def index_sick_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sick_get_serialize( + _param = self._index_shadowserver_exploited_get_serialize( page=page, limit=limit, cursor=cursor, @@ -261707,7 +261707,7 @@ def index_sick_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySickPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination", '404': "str", '500': "str", } @@ -261723,7 +261723,7 @@ def index_sick_get_with_http_info( @validate_call - def index_sick_get_without_preload_content( + def index_shadowserver_exploited_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -261762,9 +261762,9 @@ def index_sick_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sick\" + """Return vulnerability data stored in index \"shadowserver-exploited\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sick index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SICK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sick?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sick?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the shadowserver-exploited index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Shadowserver Foundation Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/shadowserver-exploited?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/shadowserver-exploited?cursor=` :param page: set the page number of the response :type page: int @@ -261836,7 +261836,7 @@ def index_sick_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sick_get_serialize( + _param = self._index_shadowserver_exploited_get_serialize( page=page, limit=limit, cursor=cursor, @@ -261868,7 +261868,7 @@ def index_sick_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySickPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination", '404': "str", '500': "str", } @@ -261879,7 +261879,7 @@ def index_sick_get_without_preload_content( return response_data.response - def _index_sick_get_serialize( + def _index_shadowserver_exploited_get_serialize( self, page, limit, @@ -262047,7 +262047,7 @@ def _index_sick_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sick', + resource_path='/v3/index/shadowserver-exploited', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -262064,7 +262064,7 @@ def _index_sick_get_serialize( @validate_call - def index_siemens_get( + def index_shielder_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -262102,10 +262102,10 @@ def index_siemens_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"siemens\" + ) -> RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination: + """Return vulnerability data stored in index \"shielder\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the siemens index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Siemens Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/siemens?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/siemens?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the shielder index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Shielder Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/shielder?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/shielder?cursor=` :param page: set the page number of the response :type page: int @@ -262177,7 +262177,7 @@ def index_siemens_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_siemens_get_serialize( + _param = self._index_shielder_get_serialize( page=page, limit=limit, cursor=cursor, @@ -262209,7 +262209,7 @@ def index_siemens_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination", '404': "str", '500': "str", } @@ -262225,7 +262225,7 @@ def index_siemens_get( @validate_call - def index_siemens_get_with_http_info( + def index_shielder_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -262263,10 +262263,10 @@ def index_siemens_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"siemens\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination]: + """Return vulnerability data stored in index \"shielder\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the siemens index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Siemens Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/siemens?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/siemens?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the shielder index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Shielder Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/shielder?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/shielder?cursor=` :param page: set the page number of the response :type page: int @@ -262338,7 +262338,7 @@ def index_siemens_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_siemens_get_serialize( + _param = self._index_shielder_get_serialize( page=page, limit=limit, cursor=cursor, @@ -262370,7 +262370,7 @@ def index_siemens_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination", '404': "str", '500': "str", } @@ -262386,7 +262386,7 @@ def index_siemens_get_with_http_info( @validate_call - def index_siemens_get_without_preload_content( + def index_shielder_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -262425,9 +262425,9 @@ def index_siemens_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"siemens\" + """Return vulnerability data stored in index \"shielder\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the siemens index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Siemens Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/siemens?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/siemens?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the shielder index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Shielder Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/shielder?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/shielder?cursor=` :param page: set the page number of the response :type page: int @@ -262499,7 +262499,7 @@ def index_siemens_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_siemens_get_serialize( + _param = self._index_shielder_get_serialize( page=page, limit=limit, cursor=cursor, @@ -262531,7 +262531,7 @@ def index_siemens_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination", '404': "str", '500': "str", } @@ -262542,7 +262542,7 @@ def index_siemens_get_without_preload_content( return response_data.response - def _index_siemens_get_serialize( + def _index_shielder_get_serialize( self, page, limit, @@ -262710,7 +262710,7 @@ def _index_siemens_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/siemens', + resource_path='/v3/index/shielder', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -262727,7 +262727,7 @@ def _index_siemens_get_serialize( @validate_call - def index_sierra_wireless_get( + def index_sick_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -262765,10 +262765,10 @@ def index_sierra_wireless_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination: - """Return vulnerability data stored in index \"sierra-wireless\" + ) -> RenderResponseWithMetadataArrayAdvisorySickPaginatePagination: + """Return vulnerability data stored in index \"sick\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sierra-wireless index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sierra Wireless Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sierra-wireless?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sierra-wireless?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sick index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SICK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sick?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sick?cursor=` :param page: set the page number of the response :type page: int @@ -262840,7 +262840,7 @@ def index_sierra_wireless_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sierra_wireless_get_serialize( + _param = self._index_sick_get_serialize( page=page, limit=limit, cursor=cursor, @@ -262872,7 +262872,7 @@ def index_sierra_wireless_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySickPaginatePagination", '404': "str", '500': "str", } @@ -262888,7 +262888,7 @@ def index_sierra_wireless_get( @validate_call - def index_sierra_wireless_get_with_http_info( + def index_sick_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -262926,10 +262926,10 @@ def index_sierra_wireless_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination]: - """Return vulnerability data stored in index \"sierra-wireless\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySickPaginatePagination]: + """Return vulnerability data stored in index \"sick\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sierra-wireless index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sierra Wireless Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sierra-wireless?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sierra-wireless?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sick index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SICK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sick?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sick?cursor=` :param page: set the page number of the response :type page: int @@ -263001,7 +263001,7 @@ def index_sierra_wireless_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sierra_wireless_get_serialize( + _param = self._index_sick_get_serialize( page=page, limit=limit, cursor=cursor, @@ -263033,7 +263033,7 @@ def index_sierra_wireless_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySickPaginatePagination", '404': "str", '500': "str", } @@ -263049,7 +263049,7 @@ def index_sierra_wireless_get_with_http_info( @validate_call - def index_sierra_wireless_get_without_preload_content( + def index_sick_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -263088,9 +263088,9 @@ def index_sierra_wireless_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sierra-wireless\" + """Return vulnerability data stored in index \"sick\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sierra-wireless index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sierra Wireless Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sierra-wireless?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sierra-wireless?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sick index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SICK Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sick?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sick?cursor=` :param page: set the page number of the response :type page: int @@ -263162,7 +263162,7 @@ def index_sierra_wireless_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sierra_wireless_get_serialize( + _param = self._index_sick_get_serialize( page=page, limit=limit, cursor=cursor, @@ -263194,7 +263194,7 @@ def index_sierra_wireless_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySickPaginatePagination", '404': "str", '500': "str", } @@ -263205,7 +263205,7 @@ def index_sierra_wireless_get_without_preload_content( return response_data.response - def _index_sierra_wireless_get_serialize( + def _index_sick_get_serialize( self, page, limit, @@ -263373,7 +263373,7 @@ def _index_sierra_wireless_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sierra-wireless', + resource_path='/v3/index/sick', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -263390,7 +263390,7 @@ def _index_sierra_wireless_get_serialize( @validate_call - def index_sigmahq_sigma_rules_get( + def index_siemens_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -263428,10 +263428,10 @@ def index_sigmahq_sigma_rules_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination: - """Return vulnerability data stored in index \"sigmahq-sigma-rules\" + ) -> RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"siemens\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sigmahq-sigma-rules index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sigma Rules ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sigmahq-sigma-rules?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sigmahq-sigma-rules?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the siemens index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Siemens Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/siemens?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/siemens?cursor=` :param page: set the page number of the response :type page: int @@ -263503,7 +263503,7 @@ def index_sigmahq_sigma_rules_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sigmahq_sigma_rules_get_serialize( + _param = self._index_siemens_get_serialize( page=page, limit=limit, cursor=cursor, @@ -263535,7 +263535,7 @@ def index_sigmahq_sigma_rules_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -263551,7 +263551,7 @@ def index_sigmahq_sigma_rules_get( @validate_call - def index_sigmahq_sigma_rules_get_with_http_info( + def index_siemens_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -263589,10 +263589,10 @@ def index_sigmahq_sigma_rules_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination]: - """Return vulnerability data stored in index \"sigmahq-sigma-rules\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"siemens\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sigmahq-sigma-rules index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sigma Rules ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sigmahq-sigma-rules?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sigmahq-sigma-rules?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the siemens index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Siemens Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/siemens?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/siemens?cursor=` :param page: set the page number of the response :type page: int @@ -263664,7 +263664,7 @@ def index_sigmahq_sigma_rules_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sigmahq_sigma_rules_get_serialize( + _param = self._index_siemens_get_serialize( page=page, limit=limit, cursor=cursor, @@ -263696,7 +263696,7 @@ def index_sigmahq_sigma_rules_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -263712,7 +263712,7 @@ def index_sigmahq_sigma_rules_get_with_http_info( @validate_call - def index_sigmahq_sigma_rules_get_without_preload_content( + def index_siemens_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -263751,9 +263751,9 @@ def index_sigmahq_sigma_rules_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sigmahq-sigma-rules\" + """Return vulnerability data stored in index \"siemens\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sigmahq-sigma-rules index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sigma Rules ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sigmahq-sigma-rules?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sigmahq-sigma-rules?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the siemens index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Siemens Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/siemens?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/siemens?cursor=` :param page: set the page number of the response :type page: int @@ -263825,7 +263825,7 @@ def index_sigmahq_sigma_rules_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sigmahq_sigma_rules_get_serialize( + _param = self._index_siemens_get_serialize( page=page, limit=limit, cursor=cursor, @@ -263857,7 +263857,7 @@ def index_sigmahq_sigma_rules_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -263868,7 +263868,7 @@ def index_sigmahq_sigma_rules_get_without_preload_content( return response_data.response - def _index_sigmahq_sigma_rules_get_serialize( + def _index_siemens_get_serialize( self, page, limit, @@ -264036,7 +264036,7 @@ def _index_sigmahq_sigma_rules_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sigmahq-sigma-rules', + resource_path='/v3/index/siemens', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -264053,7 +264053,7 @@ def _index_sigmahq_sigma_rules_get_serialize( @validate_call - def index_singcert_get( + def index_sierra_wireless_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -264091,10 +264091,10 @@ def index_singcert_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination: - """Return vulnerability data stored in index \"singcert\" + ) -> RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination: + """Return vulnerability data stored in index \"sierra-wireless\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the singcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CSA Alerts and Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/singcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/singcert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sierra-wireless index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sierra Wireless Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sierra-wireless?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sierra-wireless?cursor=` :param page: set the page number of the response :type page: int @@ -264166,7 +264166,7 @@ def index_singcert_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_singcert_get_serialize( + _param = self._index_sierra_wireless_get_serialize( page=page, limit=limit, cursor=cursor, @@ -264198,7 +264198,7 @@ def index_singcert_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination", '404': "str", '500': "str", } @@ -264214,7 +264214,7 @@ def index_singcert_get( @validate_call - def index_singcert_get_with_http_info( + def index_sierra_wireless_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -264252,10 +264252,10 @@ def index_singcert_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination]: - """Return vulnerability data stored in index \"singcert\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination]: + """Return vulnerability data stored in index \"sierra-wireless\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the singcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CSA Alerts and Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/singcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/singcert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sierra-wireless index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sierra Wireless Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sierra-wireless?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sierra-wireless?cursor=` :param page: set the page number of the response :type page: int @@ -264327,7 +264327,7 @@ def index_singcert_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_singcert_get_serialize( + _param = self._index_sierra_wireless_get_serialize( page=page, limit=limit, cursor=cursor, @@ -264359,7 +264359,7 @@ def index_singcert_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination", '404': "str", '500': "str", } @@ -264375,7 +264375,7 @@ def index_singcert_get_with_http_info( @validate_call - def index_singcert_get_without_preload_content( + def index_sierra_wireless_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -264414,9 +264414,9 @@ def index_singcert_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"singcert\" + """Return vulnerability data stored in index \"sierra-wireless\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the singcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CSA Alerts and Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/singcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/singcert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sierra-wireless index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sierra Wireless Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sierra-wireless?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sierra-wireless?cursor=` :param page: set the page number of the response :type page: int @@ -264488,7 +264488,7 @@ def index_singcert_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_singcert_get_serialize( + _param = self._index_sierra_wireless_get_serialize( page=page, limit=limit, cursor=cursor, @@ -264520,7 +264520,7 @@ def index_singcert_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination", '404': "str", '500': "str", } @@ -264531,7 +264531,7 @@ def index_singcert_get_without_preload_content( return response_data.response - def _index_singcert_get_serialize( + def _index_sierra_wireless_get_serialize( self, page, limit, @@ -264699,7 +264699,7 @@ def _index_singcert_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/singcert', + resource_path='/v3/index/sierra-wireless', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -264716,7 +264716,7 @@ def _index_singcert_get_serialize( @validate_call - def index_sitecore_get( + def index_sigmahq_sigma_rules_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -264754,10 +264754,10 @@ def index_sitecore_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination: - """Return vulnerability data stored in index \"sitecore\" + ) -> RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination: + """Return vulnerability data stored in index \"sigmahq-sigma-rules\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sitecore index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sitecore Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sitecore?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sitecore?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sigmahq-sigma-rules index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sigma Rules ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sigmahq-sigma-rules?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sigmahq-sigma-rules?cursor=` :param page: set the page number of the response :type page: int @@ -264829,7 +264829,7 @@ def index_sitecore_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sitecore_get_serialize( + _param = self._index_sigmahq_sigma_rules_get_serialize( page=page, limit=limit, cursor=cursor, @@ -264861,7 +264861,7 @@ def index_sitecore_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination", '404': "str", '500': "str", } @@ -264877,7 +264877,7 @@ def index_sitecore_get( @validate_call - def index_sitecore_get_with_http_info( + def index_sigmahq_sigma_rules_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -264915,10 +264915,10 @@ def index_sitecore_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination]: - """Return vulnerability data stored in index \"sitecore\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination]: + """Return vulnerability data stored in index \"sigmahq-sigma-rules\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sitecore index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sitecore Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sitecore?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sitecore?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sigmahq-sigma-rules index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sigma Rules ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sigmahq-sigma-rules?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sigmahq-sigma-rules?cursor=` :param page: set the page number of the response :type page: int @@ -264990,7 +264990,7 @@ def index_sitecore_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sitecore_get_serialize( + _param = self._index_sigmahq_sigma_rules_get_serialize( page=page, limit=limit, cursor=cursor, @@ -265022,7 +265022,7 @@ def index_sitecore_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination", '404': "str", '500': "str", } @@ -265038,7 +265038,7 @@ def index_sitecore_get_with_http_info( @validate_call - def index_sitecore_get_without_preload_content( + def index_sigmahq_sigma_rules_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -265077,9 +265077,9 @@ def index_sitecore_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sitecore\" + """Return vulnerability data stored in index \"sigmahq-sigma-rules\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sitecore index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sitecore Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sitecore?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sitecore?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sigmahq-sigma-rules index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sigma Rules ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sigmahq-sigma-rules?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sigmahq-sigma-rules?cursor=` :param page: set the page number of the response :type page: int @@ -265151,7 +265151,7 @@ def index_sitecore_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sitecore_get_serialize( + _param = self._index_sigmahq_sigma_rules_get_serialize( page=page, limit=limit, cursor=cursor, @@ -265183,7 +265183,7 @@ def index_sitecore_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination", '404': "str", '500': "str", } @@ -265194,7 +265194,7 @@ def index_sitecore_get_without_preload_content( return response_data.response - def _index_sitecore_get_serialize( + def _index_sigmahq_sigma_rules_get_serialize( self, page, limit, @@ -265362,7 +265362,7 @@ def _index_sitecore_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sitecore', + resource_path='/v3/index/sigmahq-sigma-rules', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -265379,7 +265379,7 @@ def _index_sitecore_get_serialize( @validate_call - def index_slackware_get( + def index_singcert_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -265417,10 +265417,10 @@ def index_slackware_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination: - """Return vulnerability data stored in index \"slackware\" + ) -> RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination: + """Return vulnerability data stored in index \"singcert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the slackware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Slackware Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/slackware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/slackware?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the singcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CSA Alerts and Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/singcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/singcert?cursor=` :param page: set the page number of the response :type page: int @@ -265492,7 +265492,7 @@ def index_slackware_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_slackware_get_serialize( + _param = self._index_singcert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -265524,7 +265524,7 @@ def index_slackware_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination", '404': "str", '500': "str", } @@ -265540,7 +265540,7 @@ def index_slackware_get( @validate_call - def index_slackware_get_with_http_info( + def index_singcert_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -265578,10 +265578,10 @@ def index_slackware_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination]: - """Return vulnerability data stored in index \"slackware\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination]: + """Return vulnerability data stored in index \"singcert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the slackware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Slackware Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/slackware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/slackware?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the singcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CSA Alerts and Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/singcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/singcert?cursor=` :param page: set the page number of the response :type page: int @@ -265653,7 +265653,7 @@ def index_slackware_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_slackware_get_serialize( + _param = self._index_singcert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -265685,7 +265685,7 @@ def index_slackware_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination", '404': "str", '500': "str", } @@ -265701,7 +265701,7 @@ def index_slackware_get_with_http_info( @validate_call - def index_slackware_get_without_preload_content( + def index_singcert_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -265740,9 +265740,9 @@ def index_slackware_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"slackware\" + """Return vulnerability data stored in index \"singcert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the slackware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Slackware Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/slackware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/slackware?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the singcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** CSA Alerts and Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/singcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/singcert?cursor=` :param page: set the page number of the response :type page: int @@ -265814,7 +265814,7 @@ def index_slackware_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_slackware_get_serialize( + _param = self._index_singcert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -265846,7 +265846,7 @@ def index_slackware_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination", '404': "str", '500': "str", } @@ -265857,7 +265857,7 @@ def index_slackware_get_without_preload_content( return response_data.response - def _index_slackware_get_serialize( + def _index_singcert_get_serialize( self, page, limit, @@ -266025,7 +266025,7 @@ def _index_slackware_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/slackware', + resource_path='/v3/index/singcert', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -266042,7 +266042,7 @@ def _index_slackware_get_serialize( @validate_call - def index_solarwinds_get( + def index_sitecore_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -266080,10 +266080,10 @@ def index_solarwinds_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"solarwinds\" + ) -> RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination: + """Return vulnerability data stored in index \"sitecore\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the solarwinds index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SolarWinds Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/solarwinds?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/solarwinds?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sitecore index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sitecore Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sitecore?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sitecore?cursor=` :param page: set the page number of the response :type page: int @@ -266155,7 +266155,7 @@ def index_solarwinds_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_solarwinds_get_serialize( + _param = self._index_sitecore_get_serialize( page=page, limit=limit, cursor=cursor, @@ -266187,7 +266187,7 @@ def index_solarwinds_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination", '404': "str", '500': "str", } @@ -266203,7 +266203,7 @@ def index_solarwinds_get( @validate_call - def index_solarwinds_get_with_http_info( + def index_sitecore_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -266241,10 +266241,10 @@ def index_solarwinds_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"solarwinds\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination]: + """Return vulnerability data stored in index \"sitecore\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the solarwinds index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SolarWinds Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/solarwinds?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/solarwinds?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sitecore index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sitecore Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sitecore?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sitecore?cursor=` :param page: set the page number of the response :type page: int @@ -266316,7 +266316,7 @@ def index_solarwinds_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_solarwinds_get_serialize( + _param = self._index_sitecore_get_serialize( page=page, limit=limit, cursor=cursor, @@ -266348,7 +266348,7 @@ def index_solarwinds_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination", '404': "str", '500': "str", } @@ -266364,7 +266364,7 @@ def index_solarwinds_get_with_http_info( @validate_call - def index_solarwinds_get_without_preload_content( + def index_sitecore_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -266403,9 +266403,9 @@ def index_solarwinds_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"solarwinds\" + """Return vulnerability data stored in index \"sitecore\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the solarwinds index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SolarWinds Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/solarwinds?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/solarwinds?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sitecore index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sitecore Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sitecore?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sitecore?cursor=` :param page: set the page number of the response :type page: int @@ -266477,7 +266477,7 @@ def index_solarwinds_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_solarwinds_get_serialize( + _param = self._index_sitecore_get_serialize( page=page, limit=limit, cursor=cursor, @@ -266509,7 +266509,7 @@ def index_solarwinds_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination", '404': "str", '500': "str", } @@ -266520,7 +266520,7 @@ def index_solarwinds_get_without_preload_content( return response_data.response - def _index_solarwinds_get_serialize( + def _index_sitecore_get_serialize( self, page, limit, @@ -266688,7 +266688,7 @@ def _index_solarwinds_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/solarwinds', + resource_path='/v3/index/sitecore', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -266705,7 +266705,7 @@ def _index_solarwinds_get_serialize( @validate_call - def index_solr_get( + def index_slackware_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -266743,10 +266743,10 @@ def index_solr_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination: - """Return vulnerability data stored in index \"solr\" + ) -> RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination: + """Return vulnerability data stored in index \"slackware\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the solr index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Solr CVE Reports ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/solr?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/solr?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the slackware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Slackware Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/slackware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/slackware?cursor=` :param page: set the page number of the response :type page: int @@ -266818,7 +266818,7 @@ def index_solr_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_solr_get_serialize( + _param = self._index_slackware_get_serialize( page=page, limit=limit, cursor=cursor, @@ -266850,7 +266850,7 @@ def index_solr_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination", '404': "str", '500': "str", } @@ -266866,7 +266866,7 @@ def index_solr_get( @validate_call - def index_solr_get_with_http_info( + def index_slackware_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -266904,10 +266904,10 @@ def index_solr_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination]: - """Return vulnerability data stored in index \"solr\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination]: + """Return vulnerability data stored in index \"slackware\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the solr index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Solr CVE Reports ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/solr?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/solr?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the slackware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Slackware Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/slackware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/slackware?cursor=` :param page: set the page number of the response :type page: int @@ -266979,7 +266979,7 @@ def index_solr_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_solr_get_serialize( + _param = self._index_slackware_get_serialize( page=page, limit=limit, cursor=cursor, @@ -267011,7 +267011,7 @@ def index_solr_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination", '404': "str", '500': "str", } @@ -267027,7 +267027,7 @@ def index_solr_get_with_http_info( @validate_call - def index_solr_get_without_preload_content( + def index_slackware_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -267066,9 +267066,9 @@ def index_solr_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"solr\" + """Return vulnerability data stored in index \"slackware\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the solr index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Solr CVE Reports ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/solr?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/solr?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the slackware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Slackware Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/slackware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/slackware?cursor=` :param page: set the page number of the response :type page: int @@ -267140,7 +267140,7 @@ def index_solr_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_solr_get_serialize( + _param = self._index_slackware_get_serialize( page=page, limit=limit, cursor=cursor, @@ -267172,7 +267172,7 @@ def index_solr_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination", '404': "str", '500': "str", } @@ -267183,7 +267183,7 @@ def index_solr_get_without_preload_content( return response_data.response - def _index_solr_get_serialize( + def _index_slackware_get_serialize( self, page, limit, @@ -267351,7 +267351,7 @@ def _index_solr_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/solr', + resource_path='/v3/index/slackware', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -267368,7 +267368,7 @@ def _index_solr_get_serialize( @validate_call - def index_sonatype_get( + def index_solarwinds_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -267406,10 +267406,10 @@ def index_sonatype_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination: - """Return vulnerability data stored in index \"sonatype\" + ) -> RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"solarwinds\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sonatype index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sonatype Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sonatype?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sonatype?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the solarwinds index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SolarWinds Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/solarwinds?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/solarwinds?cursor=` :param page: set the page number of the response :type page: int @@ -267481,7 +267481,7 @@ def index_sonatype_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sonatype_get_serialize( + _param = self._index_solarwinds_get_serialize( page=page, limit=limit, cursor=cursor, @@ -267513,7 +267513,7 @@ def index_sonatype_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -267529,7 +267529,7 @@ def index_sonatype_get( @validate_call - def index_sonatype_get_with_http_info( + def index_solarwinds_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -267567,10 +267567,10 @@ def index_sonatype_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination]: - """Return vulnerability data stored in index \"sonatype\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"solarwinds\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sonatype index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sonatype Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sonatype?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sonatype?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the solarwinds index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SolarWinds Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/solarwinds?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/solarwinds?cursor=` :param page: set the page number of the response :type page: int @@ -267642,7 +267642,7 @@ def index_sonatype_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sonatype_get_serialize( + _param = self._index_solarwinds_get_serialize( page=page, limit=limit, cursor=cursor, @@ -267674,7 +267674,7 @@ def index_sonatype_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -267690,7 +267690,7 @@ def index_sonatype_get_with_http_info( @validate_call - def index_sonatype_get_without_preload_content( + def index_solarwinds_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -267729,9 +267729,9 @@ def index_sonatype_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sonatype\" + """Return vulnerability data stored in index \"solarwinds\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sonatype index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sonatype Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sonatype?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sonatype?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the solarwinds index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SolarWinds Security Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/solarwinds?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/solarwinds?cursor=` :param page: set the page number of the response :type page: int @@ -267803,7 +267803,7 @@ def index_sonatype_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sonatype_get_serialize( + _param = self._index_solarwinds_get_serialize( page=page, limit=limit, cursor=cursor, @@ -267835,7 +267835,7 @@ def index_sonatype_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -267846,7 +267846,7 @@ def index_sonatype_get_without_preload_content( return response_data.response - def _index_sonatype_get_serialize( + def _index_solarwinds_get_serialize( self, page, limit, @@ -268014,7 +268014,7 @@ def _index_sonatype_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sonatype', + resource_path='/v3/index/solarwinds', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -268031,7 +268031,7 @@ def _index_sonatype_get_serialize( @validate_call - def index_sonicwall_get( + def index_solr_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -268069,10 +268069,10 @@ def index_sonicwall_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"sonicwall\" + ) -> RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination: + """Return vulnerability data stored in index \"solr\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sonicwall index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SonicWall Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sonicwall?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sonicwall?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the solr index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Solr CVE Reports ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/solr?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/solr?cursor=` :param page: set the page number of the response :type page: int @@ -268144,7 +268144,7 @@ def index_sonicwall_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sonicwall_get_serialize( + _param = self._index_solr_get_serialize( page=page, limit=limit, cursor=cursor, @@ -268176,7 +268176,7 @@ def index_sonicwall_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination", '404': "str", '500': "str", } @@ -268192,7 +268192,7 @@ def index_sonicwall_get( @validate_call - def index_sonicwall_get_with_http_info( + def index_solr_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -268230,10 +268230,10 @@ def index_sonicwall_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"sonicwall\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination]: + """Return vulnerability data stored in index \"solr\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sonicwall index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SonicWall Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sonicwall?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sonicwall?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the solr index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Solr CVE Reports ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/solr?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/solr?cursor=` :param page: set the page number of the response :type page: int @@ -268305,7 +268305,7 @@ def index_sonicwall_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sonicwall_get_serialize( + _param = self._index_solr_get_serialize( page=page, limit=limit, cursor=cursor, @@ -268337,7 +268337,7 @@ def index_sonicwall_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination", '404': "str", '500': "str", } @@ -268353,7 +268353,7 @@ def index_sonicwall_get_with_http_info( @validate_call - def index_sonicwall_get_without_preload_content( + def index_solr_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -268392,9 +268392,9 @@ def index_sonicwall_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sonicwall\" + """Return vulnerability data stored in index \"solr\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sonicwall index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SonicWall Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sonicwall?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sonicwall?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the solr index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Solr CVE Reports ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/solr?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/solr?cursor=` :param page: set the page number of the response :type page: int @@ -268466,7 +268466,7 @@ def index_sonicwall_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sonicwall_get_serialize( + _param = self._index_solr_get_serialize( page=page, limit=limit, cursor=cursor, @@ -268498,7 +268498,7 @@ def index_sonicwall_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination", '404': "str", '500': "str", } @@ -268509,7 +268509,7 @@ def index_sonicwall_get_without_preload_content( return response_data.response - def _index_sonicwall_get_serialize( + def _index_solr_get_serialize( self, page, limit, @@ -268677,7 +268677,7 @@ def _index_sonicwall_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sonicwall', + resource_path='/v3/index/solr', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -268694,7 +268694,7 @@ def _index_sonicwall_get_serialize( @validate_call - def index_spacelabs_healthcare_get( + def index_sonatype_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -268732,10 +268732,10 @@ def index_spacelabs_healthcare_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"spacelabs-healthcare\" + ) -> RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination: + """Return vulnerability data stored in index \"sonatype\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the spacelabs-healthcare index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Spacelabs Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/spacelabs-healthcare?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/spacelabs-healthcare?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sonatype index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sonatype Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sonatype?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sonatype?cursor=` :param page: set the page number of the response :type page: int @@ -268807,7 +268807,7 @@ def index_spacelabs_healthcare_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_spacelabs_healthcare_get_serialize( + _param = self._index_sonatype_get_serialize( page=page, limit=limit, cursor=cursor, @@ -268839,7 +268839,7 @@ def index_spacelabs_healthcare_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination", '404': "str", '500': "str", } @@ -268855,7 +268855,7 @@ def index_spacelabs_healthcare_get( @validate_call - def index_spacelabs_healthcare_get_with_http_info( + def index_sonatype_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -268893,10 +268893,10 @@ def index_spacelabs_healthcare_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"spacelabs-healthcare\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination]: + """Return vulnerability data stored in index \"sonatype\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the spacelabs-healthcare index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Spacelabs Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/spacelabs-healthcare?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/spacelabs-healthcare?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sonatype index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sonatype Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sonatype?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sonatype?cursor=` :param page: set the page number of the response :type page: int @@ -268968,7 +268968,7 @@ def index_spacelabs_healthcare_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_spacelabs_healthcare_get_serialize( + _param = self._index_sonatype_get_serialize( page=page, limit=limit, cursor=cursor, @@ -269000,7 +269000,7 @@ def index_spacelabs_healthcare_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination", '404': "str", '500': "str", } @@ -269016,7 +269016,7 @@ def index_spacelabs_healthcare_get_with_http_info( @validate_call - def index_spacelabs_healthcare_get_without_preload_content( + def index_sonatype_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -269055,9 +269055,9 @@ def index_spacelabs_healthcare_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"spacelabs-healthcare\" + """Return vulnerability data stored in index \"sonatype\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the spacelabs-healthcare index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Spacelabs Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/spacelabs-healthcare?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/spacelabs-healthcare?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sonatype index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sonatype Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sonatype?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sonatype?cursor=` :param page: set the page number of the response :type page: int @@ -269129,7 +269129,7 @@ def index_spacelabs_healthcare_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_spacelabs_healthcare_get_serialize( + _param = self._index_sonatype_get_serialize( page=page, limit=limit, cursor=cursor, @@ -269161,7 +269161,7 @@ def index_spacelabs_healthcare_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination", '404': "str", '500': "str", } @@ -269172,7 +269172,7 @@ def index_spacelabs_healthcare_get_without_preload_content( return response_data.response - def _index_spacelabs_healthcare_get_serialize( + def _index_sonatype_get_serialize( self, page, limit, @@ -269340,7 +269340,7 @@ def _index_spacelabs_healthcare_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/spacelabs-healthcare', + resource_path='/v3/index/sonatype', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -269357,7 +269357,7 @@ def _index_spacelabs_healthcare_get_serialize( @validate_call - def index_splunk_get( + def index_sonicwall_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -269395,10 +269395,10 @@ def index_splunk_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination: - """Return vulnerability data stored in index \"splunk\" + ) -> RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"sonicwall\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the splunk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Splunk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/splunk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/splunk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sonicwall index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SonicWall Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sonicwall?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sonicwall?cursor=` :param page: set the page number of the response :type page: int @@ -269470,7 +269470,7 @@ def index_splunk_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_splunk_get_serialize( + _param = self._index_sonicwall_get_serialize( page=page, limit=limit, cursor=cursor, @@ -269502,7 +269502,7 @@ def index_splunk_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -269518,7 +269518,7 @@ def index_splunk_get( @validate_call - def index_splunk_get_with_http_info( + def index_sonicwall_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -269556,10 +269556,10 @@ def index_splunk_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination]: - """Return vulnerability data stored in index \"splunk\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"sonicwall\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the splunk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Splunk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/splunk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/splunk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sonicwall index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SonicWall Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sonicwall?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sonicwall?cursor=` :param page: set the page number of the response :type page: int @@ -269631,7 +269631,7 @@ def index_splunk_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_splunk_get_serialize( + _param = self._index_sonicwall_get_serialize( page=page, limit=limit, cursor=cursor, @@ -269663,7 +269663,7 @@ def index_splunk_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -269679,7 +269679,7 @@ def index_splunk_get_with_http_info( @validate_call - def index_splunk_get_without_preload_content( + def index_sonicwall_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -269718,9 +269718,9 @@ def index_splunk_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"splunk\" + """Return vulnerability data stored in index \"sonicwall\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the splunk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Splunk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/splunk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/splunk?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sonicwall index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SonicWall Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sonicwall?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sonicwall?cursor=` :param page: set the page number of the response :type page: int @@ -269792,7 +269792,7 @@ def index_splunk_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_splunk_get_serialize( + _param = self._index_sonicwall_get_serialize( page=page, limit=limit, cursor=cursor, @@ -269824,7 +269824,7 @@ def index_splunk_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -269835,7 +269835,7 @@ def index_splunk_get_without_preload_content( return response_data.response - def _index_splunk_get_serialize( + def _index_sonicwall_get_serialize( self, page, limit, @@ -270003,7 +270003,7 @@ def _index_splunk_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/splunk', + resource_path='/v3/index/sonicwall', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -270020,7 +270020,7 @@ def _index_splunk_get_serialize( @validate_call - def index_spring_get( + def index_spacelabs_healthcare_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -270058,10 +270058,10 @@ def index_spring_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination: - """Return vulnerability data stored in index \"spring\" + ) -> RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"spacelabs-healthcare\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the spring index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Spring Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/spring?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/spring?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the spacelabs-healthcare index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Spacelabs Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/spacelabs-healthcare?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/spacelabs-healthcare?cursor=` :param page: set the page number of the response :type page: int @@ -270133,7 +270133,7 @@ def index_spring_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_spring_get_serialize( + _param = self._index_spacelabs_healthcare_get_serialize( page=page, limit=limit, cursor=cursor, @@ -270165,7 +270165,7 @@ def index_spring_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -270181,7 +270181,7 @@ def index_spring_get( @validate_call - def index_spring_get_with_http_info( + def index_spacelabs_healthcare_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -270219,10 +270219,10 @@ def index_spring_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination]: - """Return vulnerability data stored in index \"spring\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"spacelabs-healthcare\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the spring index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Spring Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/spring?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/spring?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the spacelabs-healthcare index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Spacelabs Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/spacelabs-healthcare?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/spacelabs-healthcare?cursor=` :param page: set the page number of the response :type page: int @@ -270294,7 +270294,7 @@ def index_spring_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_spring_get_serialize( + _param = self._index_spacelabs_healthcare_get_serialize( page=page, limit=limit, cursor=cursor, @@ -270326,7 +270326,7 @@ def index_spring_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -270342,7 +270342,7 @@ def index_spring_get_with_http_info( @validate_call - def index_spring_get_without_preload_content( + def index_spacelabs_healthcare_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -270381,9 +270381,9 @@ def index_spring_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"spring\" + """Return vulnerability data stored in index \"spacelabs-healthcare\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the spring index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Spring Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/spring?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/spring?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the spacelabs-healthcare index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Spacelabs Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/spacelabs-healthcare?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/spacelabs-healthcare?cursor=` :param page: set the page number of the response :type page: int @@ -270455,7 +270455,7 @@ def index_spring_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_spring_get_serialize( + _param = self._index_spacelabs_healthcare_get_serialize( page=page, limit=limit, cursor=cursor, @@ -270487,7 +270487,7 @@ def index_spring_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -270498,7 +270498,7 @@ def index_spring_get_without_preload_content( return response_data.response - def _index_spring_get_serialize( + def _index_spacelabs_healthcare_get_serialize( self, page, limit, @@ -270666,7 +270666,7 @@ def _index_spring_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/spring', + resource_path='/v3/index/spacelabs-healthcare', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -270683,7 +270683,7 @@ def _index_spring_get_serialize( @validate_call - def index_ssd_get( + def index_splunk_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -270721,10 +270721,10 @@ def index_ssd_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"ssd\" + ) -> RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination: + """Return vulnerability data stored in index \"splunk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ssd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SSD Secure Disclosure Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ssd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ssd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the splunk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Splunk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/splunk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/splunk?cursor=` :param page: set the page number of the response :type page: int @@ -270796,7 +270796,7 @@ def index_ssd_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ssd_get_serialize( + _param = self._index_splunk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -270828,7 +270828,7 @@ def index_ssd_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination", '404': "str", '500': "str", } @@ -270844,7 +270844,7 @@ def index_ssd_get( @validate_call - def index_ssd_get_with_http_info( + def index_splunk_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -270882,10 +270882,10 @@ def index_ssd_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"ssd\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination]: + """Return vulnerability data stored in index \"splunk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ssd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SSD Secure Disclosure Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ssd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ssd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the splunk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Splunk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/splunk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/splunk?cursor=` :param page: set the page number of the response :type page: int @@ -270957,7 +270957,7 @@ def index_ssd_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ssd_get_serialize( + _param = self._index_splunk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -270989,7 +270989,7 @@ def index_ssd_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination", '404': "str", '500': "str", } @@ -271005,7 +271005,7 @@ def index_ssd_get_with_http_info( @validate_call - def index_ssd_get_without_preload_content( + def index_splunk_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -271044,9 +271044,9 @@ def index_ssd_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ssd\" + """Return vulnerability data stored in index \"splunk\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ssd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SSD Secure Disclosure Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ssd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ssd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the splunk index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Splunk Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/splunk?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/splunk?cursor=` :param page: set the page number of the response :type page: int @@ -271118,7 +271118,7 @@ def index_ssd_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ssd_get_serialize( + _param = self._index_splunk_get_serialize( page=page, limit=limit, cursor=cursor, @@ -271150,7 +271150,7 @@ def index_ssd_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination", '404': "str", '500': "str", } @@ -271161,7 +271161,7 @@ def index_ssd_get_without_preload_content( return response_data.response - def _index_ssd_get_serialize( + def _index_splunk_get_serialize( self, page, limit, @@ -271329,7 +271329,7 @@ def _index_ssd_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ssd', + resource_path='/v3/index/splunk', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -271346,7 +271346,7 @@ def _index_ssd_get_serialize( @validate_call - def index_stormshield_get( + def index_spring_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -271384,10 +271384,10 @@ def index_stormshield_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination: - """Return vulnerability data stored in index \"stormshield\" + ) -> RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination: + """Return vulnerability data stored in index \"spring\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the stormshield index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Stormshield Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/stormshield?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/stormshield?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the spring index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Spring Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/spring?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/spring?cursor=` :param page: set the page number of the response :type page: int @@ -271459,7 +271459,7 @@ def index_stormshield_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_stormshield_get_serialize( + _param = self._index_spring_get_serialize( page=page, limit=limit, cursor=cursor, @@ -271491,7 +271491,7 @@ def index_stormshield_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination", '404': "str", '500': "str", } @@ -271507,7 +271507,7 @@ def index_stormshield_get( @validate_call - def index_stormshield_get_with_http_info( + def index_spring_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -271545,10 +271545,10 @@ def index_stormshield_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination]: - """Return vulnerability data stored in index \"stormshield\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination]: + """Return vulnerability data stored in index \"spring\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the stormshield index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Stormshield Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/stormshield?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/stormshield?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the spring index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Spring Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/spring?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/spring?cursor=` :param page: set the page number of the response :type page: int @@ -271620,7 +271620,7 @@ def index_stormshield_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_stormshield_get_serialize( + _param = self._index_spring_get_serialize( page=page, limit=limit, cursor=cursor, @@ -271652,7 +271652,7 @@ def index_stormshield_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination", '404': "str", '500': "str", } @@ -271668,7 +271668,7 @@ def index_stormshield_get_with_http_info( @validate_call - def index_stormshield_get_without_preload_content( + def index_spring_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -271707,9 +271707,9 @@ def index_stormshield_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"stormshield\" + """Return vulnerability data stored in index \"spring\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the stormshield index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Stormshield Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/stormshield?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/stormshield?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the spring index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Spring Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/spring?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/spring?cursor=` :param page: set the page number of the response :type page: int @@ -271781,7 +271781,7 @@ def index_stormshield_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_stormshield_get_serialize( + _param = self._index_spring_get_serialize( page=page, limit=limit, cursor=cursor, @@ -271813,7 +271813,7 @@ def index_stormshield_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination", '404': "str", '500': "str", } @@ -271824,7 +271824,7 @@ def index_stormshield_get_without_preload_content( return response_data.response - def _index_stormshield_get_serialize( + def _index_spring_get_serialize( self, page, limit, @@ -271992,7 +271992,7 @@ def _index_stormshield_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/stormshield', + resource_path='/v3/index/spring', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -272009,7 +272009,7 @@ def _index_stormshield_get_serialize( @validate_call - def index_stryker_get( + def index_ssd_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -272047,10 +272047,10 @@ def index_stryker_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"stryker\" + ) -> RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"ssd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the stryker index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Stryker Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/stryker?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/stryker?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ssd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SSD Secure Disclosure Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ssd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ssd?cursor=` :param page: set the page number of the response :type page: int @@ -272122,7 +272122,7 @@ def index_stryker_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_stryker_get_serialize( + _param = self._index_ssd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -272154,7 +272154,7 @@ def index_stryker_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -272170,7 +272170,7 @@ def index_stryker_get( @validate_call - def index_stryker_get_with_http_info( + def index_ssd_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -272208,10 +272208,10 @@ def index_stryker_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"stryker\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"ssd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the stryker index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Stryker Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/stryker?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/stryker?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ssd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SSD Secure Disclosure Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ssd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ssd?cursor=` :param page: set the page number of the response :type page: int @@ -272283,7 +272283,7 @@ def index_stryker_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_stryker_get_serialize( + _param = self._index_ssd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -272315,7 +272315,7 @@ def index_stryker_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -272331,7 +272331,7 @@ def index_stryker_get_with_http_info( @validate_call - def index_stryker_get_without_preload_content( + def index_ssd_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -272370,9 +272370,9 @@ def index_stryker_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"stryker\" + """Return vulnerability data stored in index \"ssd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the stryker index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Stryker Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/stryker?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/stryker?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ssd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SSD Secure Disclosure Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ssd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ssd?cursor=` :param page: set the page number of the response :type page: int @@ -272444,7 +272444,7 @@ def index_stryker_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_stryker_get_serialize( + _param = self._index_ssd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -272476,7 +272476,7 @@ def index_stryker_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -272487,7 +272487,7 @@ def index_stryker_get_without_preload_content( return response_data.response - def _index_stryker_get_serialize( + def _index_ssd_get_serialize( self, page, limit, @@ -272655,7 +272655,7 @@ def _index_stryker_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/stryker', + resource_path='/v3/index/ssd', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -272672,7 +272672,7 @@ def _index_stryker_get_serialize( @validate_call - def index_sudo_get( + def index_stormshield_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -272710,10 +272710,10 @@ def index_sudo_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination: - """Return vulnerability data stored in index \"sudo\" + ) -> RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination: + """Return vulnerability data stored in index \"stormshield\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sudo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sudo Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sudo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sudo?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the stormshield index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Stormshield Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/stormshield?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/stormshield?cursor=` :param page: set the page number of the response :type page: int @@ -272785,7 +272785,7 @@ def index_sudo_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sudo_get_serialize( + _param = self._index_stormshield_get_serialize( page=page, limit=limit, cursor=cursor, @@ -272817,7 +272817,7 @@ def index_sudo_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination", '404': "str", '500': "str", } @@ -272833,7 +272833,7 @@ def index_sudo_get( @validate_call - def index_sudo_get_with_http_info( + def index_stormshield_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -272871,10 +272871,10 @@ def index_sudo_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination]: - """Return vulnerability data stored in index \"sudo\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination]: + """Return vulnerability data stored in index \"stormshield\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sudo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sudo Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sudo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sudo?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the stormshield index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Stormshield Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/stormshield?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/stormshield?cursor=` :param page: set the page number of the response :type page: int @@ -272946,7 +272946,7 @@ def index_sudo_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sudo_get_serialize( + _param = self._index_stormshield_get_serialize( page=page, limit=limit, cursor=cursor, @@ -272978,7 +272978,7 @@ def index_sudo_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination", '404': "str", '500': "str", } @@ -272994,7 +272994,7 @@ def index_sudo_get_with_http_info( @validate_call - def index_sudo_get_without_preload_content( + def index_stormshield_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -273033,9 +273033,9 @@ def index_sudo_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"sudo\" + """Return vulnerability data stored in index \"stormshield\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sudo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sudo Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sudo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sudo?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the stormshield index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Stormshield Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/stormshield?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/stormshield?cursor=` :param page: set the page number of the response :type page: int @@ -273107,7 +273107,7 @@ def index_sudo_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_sudo_get_serialize( + _param = self._index_stormshield_get_serialize( page=page, limit=limit, cursor=cursor, @@ -273139,7 +273139,7 @@ def index_sudo_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination", '404': "str", '500': "str", } @@ -273150,7 +273150,7 @@ def index_sudo_get_without_preload_content( return response_data.response - def _index_sudo_get_serialize( + def _index_stormshield_get_serialize( self, page, limit, @@ -273318,7 +273318,7 @@ def _index_sudo_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/sudo', + resource_path='/v3/index/stormshield', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -273335,7 +273335,7 @@ def _index_sudo_get_serialize( @validate_call - def index_suse_get( + def index_stryker_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -273373,10 +273373,10 @@ def index_suse_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination: - """Return vulnerability data stored in index \"suse\" + ) -> RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"stryker\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the suse index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SUSE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/suse?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/suse?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the stryker index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Stryker Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/stryker?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/stryker?cursor=` :param page: set the page number of the response :type page: int @@ -273448,7 +273448,7 @@ def index_suse_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_suse_get_serialize( + _param = self._index_stryker_get_serialize( page=page, limit=limit, cursor=cursor, @@ -273480,7 +273480,7 @@ def index_suse_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -273496,7 +273496,7 @@ def index_suse_get( @validate_call - def index_suse_get_with_http_info( + def index_stryker_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -273534,10 +273534,10 @@ def index_suse_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination]: - """Return vulnerability data stored in index \"suse\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"stryker\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the suse index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SUSE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/suse?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/suse?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the stryker index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Stryker Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/stryker?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/stryker?cursor=` :param page: set the page number of the response :type page: int @@ -273609,7 +273609,7 @@ def index_suse_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_suse_get_serialize( + _param = self._index_stryker_get_serialize( page=page, limit=limit, cursor=cursor, @@ -273641,7 +273641,7 @@ def index_suse_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -273657,7 +273657,7 @@ def index_suse_get_with_http_info( @validate_call - def index_suse_get_without_preload_content( + def index_stryker_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -273696,9 +273696,9 @@ def index_suse_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"suse\" + """Return vulnerability data stored in index \"stryker\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the suse index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SUSE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/suse?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/suse?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the stryker index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Stryker Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/stryker?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/stryker?cursor=` :param page: set the page number of the response :type page: int @@ -273770,7 +273770,7 @@ def index_suse_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_suse_get_serialize( + _param = self._index_stryker_get_serialize( page=page, limit=limit, cursor=cursor, @@ -273802,7 +273802,7 @@ def index_suse_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -273813,7 +273813,7 @@ def index_suse_get_without_preload_content( return response_data.response - def _index_suse_get_serialize( + def _index_stryker_get_serialize( self, page, limit, @@ -273981,7 +273981,7 @@ def _index_suse_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/suse', + resource_path='/v3/index/stryker', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -273998,7 +273998,7 @@ def _index_suse_get_serialize( @validate_call - def index_suse_security_get( + def index_sudo_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -274036,10 +274036,10 @@ def index_suse_security_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination: - """Return vulnerability data stored in index \"suse-security\" + ) -> RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination: + """Return vulnerability data stored in index \"sudo\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the suse-security index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Suse Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/suse-security?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/suse-security?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sudo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sudo Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sudo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sudo?cursor=` :param page: set the page number of the response :type page: int @@ -274111,7 +274111,7 @@ def index_suse_security_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_suse_security_get_serialize( + _param = self._index_sudo_get_serialize( page=page, limit=limit, cursor=cursor, @@ -274143,7 +274143,7 @@ def index_suse_security_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination", '404': "str", '500': "str", } @@ -274159,7 +274159,7 @@ def index_suse_security_get( @validate_call - def index_suse_security_get_with_http_info( + def index_sudo_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -274197,10 +274197,10 @@ def index_suse_security_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination]: - """Return vulnerability data stored in index \"suse-security\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination]: + """Return vulnerability data stored in index \"sudo\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the suse-security index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Suse Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/suse-security?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/suse-security?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sudo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sudo Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sudo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sudo?cursor=` :param page: set the page number of the response :type page: int @@ -274272,7 +274272,7 @@ def index_suse_security_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_suse_security_get_serialize( + _param = self._index_sudo_get_serialize( page=page, limit=limit, cursor=cursor, @@ -274304,7 +274304,7 @@ def index_suse_security_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination", '404': "str", '500': "str", } @@ -274320,7 +274320,7 @@ def index_suse_security_get_with_http_info( @validate_call - def index_suse_security_get_without_preload_content( + def index_sudo_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -274359,9 +274359,9 @@ def index_suse_security_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"suse-security\" + """Return vulnerability data stored in index \"sudo\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the suse-security index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Suse Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/suse-security?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/suse-security?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the sudo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Sudo Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/sudo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/sudo?cursor=` :param page: set the page number of the response :type page: int @@ -274433,7 +274433,7 @@ def index_suse_security_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_suse_security_get_serialize( + _param = self._index_sudo_get_serialize( page=page, limit=limit, cursor=cursor, @@ -274465,7 +274465,7 @@ def index_suse_security_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination", '404': "str", '500': "str", } @@ -274476,7 +274476,7 @@ def index_suse_security_get_without_preload_content( return response_data.response - def _index_suse_security_get_serialize( + def _index_sudo_get_serialize( self, page, limit, @@ -274644,7 +274644,7 @@ def _index_suse_security_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/suse-security', + resource_path='/v3/index/sudo', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -274661,7 +274661,7 @@ def _index_suse_security_get_serialize( @validate_call - def index_swift_get( + def index_suse_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -274699,10 +274699,10 @@ def index_swift_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: - """Return vulnerability data stored in index \"swift\" + ) -> RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination: + """Return vulnerability data stored in index \"suse\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the swift index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Swift packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/swift?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/swift?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the suse index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SUSE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/suse?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/suse?cursor=` :param page: set the page number of the response :type page: int @@ -274774,7 +274774,7 @@ def index_swift_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_swift_get_serialize( + _param = self._index_suse_get_serialize( page=page, limit=limit, cursor=cursor, @@ -274806,7 +274806,7 @@ def index_swift_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination", '404': "str", '500': "str", } @@ -274822,7 +274822,7 @@ def index_swift_get( @validate_call - def index_swift_get_with_http_info( + def index_suse_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -274860,10 +274860,10 @@ def index_swift_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: - """Return vulnerability data stored in index \"swift\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination]: + """Return vulnerability data stored in index \"suse\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the swift index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Swift packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/swift?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/swift?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the suse index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SUSE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/suse?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/suse?cursor=` :param page: set the page number of the response :type page: int @@ -274935,7 +274935,7 @@ def index_swift_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_swift_get_serialize( + _param = self._index_suse_get_serialize( page=page, limit=limit, cursor=cursor, @@ -274967,7 +274967,7 @@ def index_swift_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination", '404': "str", '500': "str", } @@ -274983,7 +274983,7 @@ def index_swift_get_with_http_info( @validate_call - def index_swift_get_without_preload_content( + def index_suse_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -275022,9 +275022,9 @@ def index_swift_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"swift\" + """Return vulnerability data stored in index \"suse\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the swift index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Swift packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/swift?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/swift?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the suse index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SUSE Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/suse?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/suse?cursor=` :param page: set the page number of the response :type page: int @@ -275096,7 +275096,7 @@ def index_swift_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_swift_get_serialize( + _param = self._index_suse_get_serialize( page=page, limit=limit, cursor=cursor, @@ -275128,7 +275128,7 @@ def index_swift_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination", '404': "str", '500': "str", } @@ -275139,7 +275139,7 @@ def index_swift_get_without_preload_content( return response_data.response - def _index_swift_get_serialize( + def _index_suse_get_serialize( self, page, limit, @@ -275307,7 +275307,7 @@ def _index_swift_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/swift', + resource_path='/v3/index/suse', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -275324,7 +275324,7 @@ def _index_swift_get_serialize( @validate_call - def index_swisslog_healthcare_get( + def index_suse_security_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -275362,10 +275362,10 @@ def index_swisslog_healthcare_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"swisslog-healthcare\" + ) -> RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination: + """Return vulnerability data stored in index \"suse-security\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the swisslog-healthcare index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Swisslog Healthcare CVE Disclosures ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/swisslog-healthcare?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/swisslog-healthcare?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the suse-security index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Suse Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/suse-security?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/suse-security?cursor=` :param page: set the page number of the response :type page: int @@ -275437,7 +275437,7 @@ def index_swisslog_healthcare_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_swisslog_healthcare_get_serialize( + _param = self._index_suse_security_get_serialize( page=page, limit=limit, cursor=cursor, @@ -275469,7 +275469,7 @@ def index_swisslog_healthcare_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination", '404': "str", '500': "str", } @@ -275485,7 +275485,7 @@ def index_swisslog_healthcare_get( @validate_call - def index_swisslog_healthcare_get_with_http_info( + def index_suse_security_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -275523,10 +275523,10 @@ def index_swisslog_healthcare_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"swisslog-healthcare\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination]: + """Return vulnerability data stored in index \"suse-security\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the swisslog-healthcare index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Swisslog Healthcare CVE Disclosures ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/swisslog-healthcare?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/swisslog-healthcare?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the suse-security index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Suse Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/suse-security?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/suse-security?cursor=` :param page: set the page number of the response :type page: int @@ -275598,7 +275598,7 @@ def index_swisslog_healthcare_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_swisslog_healthcare_get_serialize( + _param = self._index_suse_security_get_serialize( page=page, limit=limit, cursor=cursor, @@ -275630,7 +275630,7 @@ def index_swisslog_healthcare_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination", '404': "str", '500': "str", } @@ -275646,7 +275646,7 @@ def index_swisslog_healthcare_get_with_http_info( @validate_call - def index_swisslog_healthcare_get_without_preload_content( + def index_suse_security_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -275685,9 +275685,9 @@ def index_swisslog_healthcare_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"swisslog-healthcare\" + """Return vulnerability data stored in index \"suse-security\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the swisslog-healthcare index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Swisslog Healthcare CVE Disclosures ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/swisslog-healthcare?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/swisslog-healthcare?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the suse-security index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Suse Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/suse-security?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/suse-security?cursor=` :param page: set the page number of the response :type page: int @@ -275759,7 +275759,7 @@ def index_swisslog_healthcare_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_swisslog_healthcare_get_serialize( + _param = self._index_suse_security_get_serialize( page=page, limit=limit, cursor=cursor, @@ -275791,7 +275791,7 @@ def index_swisslog_healthcare_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination", '404': "str", '500': "str", } @@ -275802,7 +275802,7 @@ def index_swisslog_healthcare_get_without_preload_content( return response_data.response - def _index_swisslog_healthcare_get_serialize( + def _index_suse_security_get_serialize( self, page, limit, @@ -275970,7 +275970,7 @@ def _index_swisslog_healthcare_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/swisslog-healthcare', + resource_path='/v3/index/suse-security', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -275987,7 +275987,7 @@ def _index_swisslog_healthcare_get_serialize( @validate_call - def index_symfony_get( + def index_swift_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -276025,10 +276025,10 @@ def index_symfony_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination: - """Return vulnerability data stored in index \"symfony\" + ) -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination: + """Return vulnerability data stored in index \"swift\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the symfony index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Symfony Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/symfony?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/symfony?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the swift index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Swift packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/swift?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/swift?cursor=` :param page: set the page number of the response :type page: int @@ -276100,7 +276100,7 @@ def index_symfony_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_symfony_get_serialize( + _param = self._index_swift_get_serialize( page=page, limit=limit, cursor=cursor, @@ -276132,7 +276132,7 @@ def index_symfony_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -276148,7 +276148,7 @@ def index_symfony_get( @validate_call - def index_symfony_get_with_http_info( + def index_swift_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -276186,10 +276186,10 @@ def index_symfony_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination]: - """Return vulnerability data stored in index \"symfony\" + ) -> ApiResponse[RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination]: + """Return vulnerability data stored in index \"swift\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the symfony index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Symfony Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/symfony?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/symfony?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the swift index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Swift packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/swift?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/swift?cursor=` :param page: set the page number of the response :type page: int @@ -276261,7 +276261,7 @@ def index_symfony_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_symfony_get_serialize( + _param = self._index_swift_get_serialize( page=page, limit=limit, cursor=cursor, @@ -276293,7 +276293,7 @@ def index_symfony_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -276309,7 +276309,7 @@ def index_symfony_get_with_http_info( @validate_call - def index_symfony_get_without_preload_content( + def index_swift_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -276348,9 +276348,9 @@ def index_symfony_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"symfony\" + """Return vulnerability data stored in index \"swift\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the symfony index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Symfony Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/symfony?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/symfony?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the swift index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Swift packages with package versions ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/swift?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/swift?cursor=` :param page: set the page number of the response :type page: int @@ -276422,7 +276422,7 @@ def index_symfony_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_symfony_get_serialize( + _param = self._index_swift_get_serialize( page=page, limit=limit, cursor=cursor, @@ -276454,7 +276454,7 @@ def index_symfony_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination", + '200': "RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination", '404': "str", '500': "str", } @@ -276465,7 +276465,7 @@ def index_symfony_get_without_preload_content( return response_data.response - def _index_symfony_get_serialize( + def _index_swift_get_serialize( self, page, limit, @@ -276633,7 +276633,7 @@ def _index_symfony_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/symfony', + resource_path='/v3/index/swift', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -276650,7 +276650,7 @@ def _index_symfony_get_serialize( @validate_call - def index_synacktiv_get( + def index_swisslog_healthcare_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -276688,10 +276688,10 @@ def index_synacktiv_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination: - """Return vulnerability data stored in index \"synacktiv\" + ) -> RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"swisslog-healthcare\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the synacktiv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Synacktiv Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/synacktiv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/synacktiv?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the swisslog-healthcare index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Swisslog Healthcare CVE Disclosures ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/swisslog-healthcare?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/swisslog-healthcare?cursor=` :param page: set the page number of the response :type page: int @@ -276763,7 +276763,7 @@ def index_synacktiv_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_synacktiv_get_serialize( + _param = self._index_swisslog_healthcare_get_serialize( page=page, limit=limit, cursor=cursor, @@ -276795,7 +276795,7 @@ def index_synacktiv_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -276811,7 +276811,7 @@ def index_synacktiv_get( @validate_call - def index_synacktiv_get_with_http_info( + def index_swisslog_healthcare_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -276849,10 +276849,10 @@ def index_synacktiv_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination]: - """Return vulnerability data stored in index \"synacktiv\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"swisslog-healthcare\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the synacktiv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Synacktiv Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/synacktiv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/synacktiv?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the swisslog-healthcare index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Swisslog Healthcare CVE Disclosures ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/swisslog-healthcare?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/swisslog-healthcare?cursor=` :param page: set the page number of the response :type page: int @@ -276924,7 +276924,7 @@ def index_synacktiv_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_synacktiv_get_serialize( + _param = self._index_swisslog_healthcare_get_serialize( page=page, limit=limit, cursor=cursor, @@ -276956,7 +276956,7 @@ def index_synacktiv_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -276972,7 +276972,7 @@ def index_synacktiv_get_with_http_info( @validate_call - def index_synacktiv_get_without_preload_content( + def index_swisslog_healthcare_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -277011,9 +277011,9 @@ def index_synacktiv_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"synacktiv\" + """Return vulnerability data stored in index \"swisslog-healthcare\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the synacktiv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Synacktiv Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/synacktiv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/synacktiv?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the swisslog-healthcare index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Swisslog Healthcare CVE Disclosures ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/swisslog-healthcare?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/swisslog-healthcare?cursor=` :param page: set the page number of the response :type page: int @@ -277085,7 +277085,7 @@ def index_synacktiv_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_synacktiv_get_serialize( + _param = self._index_swisslog_healthcare_get_serialize( page=page, limit=limit, cursor=cursor, @@ -277117,7 +277117,7 @@ def index_synacktiv_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -277128,7 +277128,7 @@ def index_synacktiv_get_without_preload_content( return response_data.response - def _index_synacktiv_get_serialize( + def _index_swisslog_healthcare_get_serialize( self, page, limit, @@ -277296,7 +277296,7 @@ def _index_synacktiv_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/synacktiv', + resource_path='/v3/index/swisslog-healthcare', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -277313,7 +277313,7 @@ def _index_synacktiv_get_serialize( @validate_call - def index_syncrosoft_get( + def index_symfony_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -277351,10 +277351,10 @@ def index_syncrosoft_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination: - """Return vulnerability data stored in index \"syncrosoft\" + ) -> RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination: + """Return vulnerability data stored in index \"symfony\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the syncrosoft index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SyncroSoft Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/syncrosoft?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/syncrosoft?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the symfony index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Symfony Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/symfony?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/symfony?cursor=` :param page: set the page number of the response :type page: int @@ -277426,7 +277426,7 @@ def index_syncrosoft_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_syncrosoft_get_serialize( + _param = self._index_symfony_get_serialize( page=page, limit=limit, cursor=cursor, @@ -277458,7 +277458,7 @@ def index_syncrosoft_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination", '404': "str", '500': "str", } @@ -277474,7 +277474,7 @@ def index_syncrosoft_get( @validate_call - def index_syncrosoft_get_with_http_info( + def index_symfony_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -277512,10 +277512,10 @@ def index_syncrosoft_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination]: - """Return vulnerability data stored in index \"syncrosoft\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination]: + """Return vulnerability data stored in index \"symfony\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the syncrosoft index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SyncroSoft Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/syncrosoft?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/syncrosoft?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the symfony index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Symfony Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/symfony?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/symfony?cursor=` :param page: set the page number of the response :type page: int @@ -277587,7 +277587,7 @@ def index_syncrosoft_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_syncrosoft_get_serialize( + _param = self._index_symfony_get_serialize( page=page, limit=limit, cursor=cursor, @@ -277619,7 +277619,7 @@ def index_syncrosoft_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination", '404': "str", '500': "str", } @@ -277635,7 +277635,7 @@ def index_syncrosoft_get_with_http_info( @validate_call - def index_syncrosoft_get_without_preload_content( + def index_symfony_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -277674,9 +277674,9 @@ def index_syncrosoft_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"syncrosoft\" + """Return vulnerability data stored in index \"symfony\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the syncrosoft index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SyncroSoft Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/syncrosoft?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/syncrosoft?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the symfony index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Symfony Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/symfony?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/symfony?cursor=` :param page: set the page number of the response :type page: int @@ -277748,7 +277748,7 @@ def index_syncrosoft_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_syncrosoft_get_serialize( + _param = self._index_symfony_get_serialize( page=page, limit=limit, cursor=cursor, @@ -277780,7 +277780,7 @@ def index_syncrosoft_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination", '404': "str", '500': "str", } @@ -277791,7 +277791,7 @@ def index_syncrosoft_get_without_preload_content( return response_data.response - def _index_syncrosoft_get_serialize( + def _index_symfony_get_serialize( self, page, limit, @@ -277959,7 +277959,7 @@ def _index_syncrosoft_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/syncrosoft', + resource_path='/v3/index/symfony', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -277976,7 +277976,7 @@ def _index_syncrosoft_get_serialize( @validate_call - def index_synology_get( + def index_synacktiv_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -278014,10 +278014,10 @@ def index_synology_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination: - """Return vulnerability data stored in index \"synology\" + ) -> RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination: + """Return vulnerability data stored in index \"synacktiv\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the synology index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Synology Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/synology?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/synology?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the synacktiv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Synacktiv Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/synacktiv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/synacktiv?cursor=` :param page: set the page number of the response :type page: int @@ -278089,7 +278089,7 @@ def index_synology_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_synology_get_serialize( + _param = self._index_synacktiv_get_serialize( page=page, limit=limit, cursor=cursor, @@ -278121,7 +278121,7 @@ def index_synology_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination", '404': "str", '500': "str", } @@ -278137,7 +278137,7 @@ def index_synology_get( @validate_call - def index_synology_get_with_http_info( + def index_synacktiv_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -278175,10 +278175,10 @@ def index_synology_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination]: - """Return vulnerability data stored in index \"synology\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination]: + """Return vulnerability data stored in index \"synacktiv\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the synology index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Synology Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/synology?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/synology?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the synacktiv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Synacktiv Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/synacktiv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/synacktiv?cursor=` :param page: set the page number of the response :type page: int @@ -278250,7 +278250,7 @@ def index_synology_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_synology_get_serialize( + _param = self._index_synacktiv_get_serialize( page=page, limit=limit, cursor=cursor, @@ -278282,7 +278282,7 @@ def index_synology_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination", '404': "str", '500': "str", } @@ -278298,7 +278298,7 @@ def index_synology_get_with_http_info( @validate_call - def index_synology_get_without_preload_content( + def index_synacktiv_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -278337,9 +278337,9 @@ def index_synology_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"synology\" + """Return vulnerability data stored in index \"synacktiv\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the synology index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Synology Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/synology?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/synology?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the synacktiv index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Synacktiv Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/synacktiv?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/synacktiv?cursor=` :param page: set the page number of the response :type page: int @@ -278411,7 +278411,7 @@ def index_synology_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_synology_get_serialize( + _param = self._index_synacktiv_get_serialize( page=page, limit=limit, cursor=cursor, @@ -278443,7 +278443,7 @@ def index_synology_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination", '404': "str", '500': "str", } @@ -278454,7 +278454,7 @@ def index_synology_get_without_preload_content( return response_data.response - def _index_synology_get_serialize( + def _index_synacktiv_get_serialize( self, page, limit, @@ -278622,7 +278622,7 @@ def _index_synology_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/synology', + resource_path='/v3/index/synacktiv', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -278639,7 +278639,7 @@ def _index_synology_get_serialize( @validate_call - def index_syss_get( + def index_syncrosoft_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -278677,10 +278677,10 @@ def index_syss_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination: - """Return vulnerability data stored in index \"syss\" + ) -> RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination: + """Return vulnerability data stored in index \"syncrosoft\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the syss index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Syss Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/syss?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/syss?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the syncrosoft index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SyncroSoft Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/syncrosoft?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/syncrosoft?cursor=` :param page: set the page number of the response :type page: int @@ -278752,7 +278752,7 @@ def index_syss_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_syss_get_serialize( + _param = self._index_syncrosoft_get_serialize( page=page, limit=limit, cursor=cursor, @@ -278784,7 +278784,7 @@ def index_syss_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination", '404': "str", '500': "str", } @@ -278800,7 +278800,7 @@ def index_syss_get( @validate_call - def index_syss_get_with_http_info( + def index_syncrosoft_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -278838,10 +278838,10 @@ def index_syss_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination]: - """Return vulnerability data stored in index \"syss\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination]: + """Return vulnerability data stored in index \"syncrosoft\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the syss index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Syss Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/syss?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/syss?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the syncrosoft index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SyncroSoft Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/syncrosoft?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/syncrosoft?cursor=` :param page: set the page number of the response :type page: int @@ -278913,7 +278913,7 @@ def index_syss_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_syss_get_serialize( + _param = self._index_syncrosoft_get_serialize( page=page, limit=limit, cursor=cursor, @@ -278945,7 +278945,7 @@ def index_syss_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination", '404': "str", '500': "str", } @@ -278961,7 +278961,7 @@ def index_syss_get_with_http_info( @validate_call - def index_syss_get_without_preload_content( + def index_syncrosoft_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -279000,9 +279000,9 @@ def index_syss_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"syss\" + """Return vulnerability data stored in index \"syncrosoft\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the syss index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Syss Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/syss?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/syss?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the syncrosoft index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** SyncroSoft Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/syncrosoft?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/syncrosoft?cursor=` :param page: set the page number of the response :type page: int @@ -279074,7 +279074,7 @@ def index_syss_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_syss_get_serialize( + _param = self._index_syncrosoft_get_serialize( page=page, limit=limit, cursor=cursor, @@ -279106,7 +279106,7 @@ def index_syss_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination", '404': "str", '500': "str", } @@ -279117,7 +279117,7 @@ def index_syss_get_without_preload_content( return response_data.response - def _index_syss_get_serialize( + def _index_syncrosoft_get_serialize( self, page, limit, @@ -279285,7 +279285,7 @@ def _index_syss_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/syss', + resource_path='/v3/index/syncrosoft', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -279302,7 +279302,7 @@ def _index_syss_get_serialize( @validate_call - def index_tailscale_get( + def index_synology_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -279340,10 +279340,10 @@ def index_tailscale_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination: - """Return vulnerability data stored in index \"tailscale\" + ) -> RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination: + """Return vulnerability data stored in index \"synology\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tailscale index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tailscale Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tailscale?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tailscale?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the synology index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Synology Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/synology?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/synology?cursor=` :param page: set the page number of the response :type page: int @@ -279415,7 +279415,7 @@ def index_tailscale_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tailscale_get_serialize( + _param = self._index_synology_get_serialize( page=page, limit=limit, cursor=cursor, @@ -279447,7 +279447,7 @@ def index_tailscale_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination", '404': "str", '500': "str", } @@ -279463,7 +279463,7 @@ def index_tailscale_get( @validate_call - def index_tailscale_get_with_http_info( + def index_synology_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -279501,10 +279501,10 @@ def index_tailscale_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination]: - """Return vulnerability data stored in index \"tailscale\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination]: + """Return vulnerability data stored in index \"synology\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tailscale index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tailscale Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tailscale?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tailscale?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the synology index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Synology Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/synology?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/synology?cursor=` :param page: set the page number of the response :type page: int @@ -279576,7 +279576,7 @@ def index_tailscale_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tailscale_get_serialize( + _param = self._index_synology_get_serialize( page=page, limit=limit, cursor=cursor, @@ -279608,7 +279608,7 @@ def index_tailscale_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination", '404': "str", '500': "str", } @@ -279624,7 +279624,7 @@ def index_tailscale_get_with_http_info( @validate_call - def index_tailscale_get_without_preload_content( + def index_synology_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -279663,9 +279663,9 @@ def index_tailscale_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"tailscale\" + """Return vulnerability data stored in index \"synology\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tailscale index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tailscale Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tailscale?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tailscale?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the synology index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Synology Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/synology?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/synology?cursor=` :param page: set the page number of the response :type page: int @@ -279737,7 +279737,7 @@ def index_tailscale_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tailscale_get_serialize( + _param = self._index_synology_get_serialize( page=page, limit=limit, cursor=cursor, @@ -279769,7 +279769,7 @@ def index_tailscale_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination", '404': "str", '500': "str", } @@ -279780,7 +279780,7 @@ def index_tailscale_get_without_preload_content( return response_data.response - def _index_tailscale_get_serialize( + def _index_synology_get_serialize( self, page, limit, @@ -279948,7 +279948,7 @@ def _index_tailscale_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/tailscale', + resource_path='/v3/index/synology', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -279965,7 +279965,7 @@ def _index_tailscale_get_serialize( @validate_call - def index_teamviewer_get( + def index_syss_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -280003,10 +280003,10 @@ def index_teamviewer_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination: - """Return vulnerability data stored in index \"teamviewer\" + ) -> RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination: + """Return vulnerability data stored in index \"syss\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the teamviewer index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TeamViewer Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/teamviewer?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/teamviewer?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the syss index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Syss Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/syss?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/syss?cursor=` :param page: set the page number of the response :type page: int @@ -280078,7 +280078,7 @@ def index_teamviewer_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_teamviewer_get_serialize( + _param = self._index_syss_get_serialize( page=page, limit=limit, cursor=cursor, @@ -280110,7 +280110,7 @@ def index_teamviewer_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination", '404': "str", '500': "str", } @@ -280126,7 +280126,7 @@ def index_teamviewer_get( @validate_call - def index_teamviewer_get_with_http_info( + def index_syss_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -280164,10 +280164,10 @@ def index_teamviewer_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination]: - """Return vulnerability data stored in index \"teamviewer\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination]: + """Return vulnerability data stored in index \"syss\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the teamviewer index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TeamViewer Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/teamviewer?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/teamviewer?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the syss index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Syss Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/syss?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/syss?cursor=` :param page: set the page number of the response :type page: int @@ -280239,7 +280239,7 @@ def index_teamviewer_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_teamviewer_get_serialize( + _param = self._index_syss_get_serialize( page=page, limit=limit, cursor=cursor, @@ -280271,7 +280271,7 @@ def index_teamviewer_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination", '404': "str", '500': "str", } @@ -280287,7 +280287,7 @@ def index_teamviewer_get_with_http_info( @validate_call - def index_teamviewer_get_without_preload_content( + def index_syss_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -280326,9 +280326,9 @@ def index_teamviewer_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"teamviewer\" + """Return vulnerability data stored in index \"syss\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the teamviewer index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TeamViewer Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/teamviewer?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/teamviewer?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the syss index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Syss Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/syss?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/syss?cursor=` :param page: set the page number of the response :type page: int @@ -280400,7 +280400,7 @@ def index_teamviewer_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_teamviewer_get_serialize( + _param = self._index_syss_get_serialize( page=page, limit=limit, cursor=cursor, @@ -280432,7 +280432,7 @@ def index_teamviewer_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination", '404': "str", '500': "str", } @@ -280443,7 +280443,7 @@ def index_teamviewer_get_without_preload_content( return response_data.response - def _index_teamviewer_get_serialize( + def _index_syss_get_serialize( self, page, limit, @@ -280611,7 +280611,7 @@ def _index_teamviewer_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/teamviewer', + resource_path='/v3/index/syss', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -280628,7 +280628,7 @@ def _index_teamviewer_get_serialize( @validate_call - def index_tenable_research_advisories_get( + def index_tailscale_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -280666,10 +280666,10 @@ def index_tenable_research_advisories_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"tenable-research-advisories\" + ) -> RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination: + """Return vulnerability data stored in index \"tailscale\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tenable-research-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tenable Research Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tenable-research-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tenable-research-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tailscale index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tailscale Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tailscale?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tailscale?cursor=` :param page: set the page number of the response :type page: int @@ -280741,7 +280741,7 @@ def index_tenable_research_advisories_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tenable_research_advisories_get_serialize( + _param = self._index_tailscale_get_serialize( page=page, limit=limit, cursor=cursor, @@ -280773,7 +280773,7 @@ def index_tenable_research_advisories_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination", '404': "str", '500': "str", } @@ -280789,7 +280789,7 @@ def index_tenable_research_advisories_get( @validate_call - def index_tenable_research_advisories_get_with_http_info( + def index_tailscale_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -280827,10 +280827,10 @@ def index_tenable_research_advisories_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"tenable-research-advisories\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination]: + """Return vulnerability data stored in index \"tailscale\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tenable-research-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tenable Research Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tenable-research-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tenable-research-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tailscale index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tailscale Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tailscale?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tailscale?cursor=` :param page: set the page number of the response :type page: int @@ -280902,7 +280902,7 @@ def index_tenable_research_advisories_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tenable_research_advisories_get_serialize( + _param = self._index_tailscale_get_serialize( page=page, limit=limit, cursor=cursor, @@ -280934,7 +280934,7 @@ def index_tenable_research_advisories_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination", '404': "str", '500': "str", } @@ -280950,7 +280950,7 @@ def index_tenable_research_advisories_get_with_http_info( @validate_call - def index_tenable_research_advisories_get_without_preload_content( + def index_tailscale_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -280989,9 +280989,9 @@ def index_tenable_research_advisories_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"tenable-research-advisories\" + """Return vulnerability data stored in index \"tailscale\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tenable-research-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tenable Research Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tenable-research-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tenable-research-advisories?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tailscale index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tailscale Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tailscale?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tailscale?cursor=` :param page: set the page number of the response :type page: int @@ -281063,7 +281063,7 @@ def index_tenable_research_advisories_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tenable_research_advisories_get_serialize( + _param = self._index_tailscale_get_serialize( page=page, limit=limit, cursor=cursor, @@ -281095,7 +281095,7 @@ def index_tenable_research_advisories_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination", '404': "str", '500': "str", } @@ -281106,7 +281106,7 @@ def index_tenable_research_advisories_get_without_preload_content( return response_data.response - def _index_tenable_research_advisories_get_serialize( + def _index_tailscale_get_serialize( self, page, limit, @@ -281274,7 +281274,7 @@ def _index_tenable_research_advisories_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/tenable-research-advisories', + resource_path='/v3/index/tailscale', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -281291,7 +281291,7 @@ def _index_tenable_research_advisories_get_serialize( @validate_call - def index_tencent_get( + def index_teamviewer_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -281329,10 +281329,10 @@ def index_tencent_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination: - """Return vulnerability data stored in index \"tencent\" + ) -> RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination: + """Return vulnerability data stored in index \"teamviewer\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tencent index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tencent Vulnerability Risk Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tencent?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tencent?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the teamviewer index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TeamViewer Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/teamviewer?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/teamviewer?cursor=` :param page: set the page number of the response :type page: int @@ -281404,7 +281404,7 @@ def index_tencent_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tencent_get_serialize( + _param = self._index_teamviewer_get_serialize( page=page, limit=limit, cursor=cursor, @@ -281436,7 +281436,7 @@ def index_tencent_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination", '404': "str", '500': "str", } @@ -281452,7 +281452,7 @@ def index_tencent_get( @validate_call - def index_tencent_get_with_http_info( + def index_teamviewer_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -281490,10 +281490,10 @@ def index_tencent_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination]: - """Return vulnerability data stored in index \"tencent\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination]: + """Return vulnerability data stored in index \"teamviewer\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tencent index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tencent Vulnerability Risk Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tencent?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tencent?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the teamviewer index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TeamViewer Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/teamviewer?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/teamviewer?cursor=` :param page: set the page number of the response :type page: int @@ -281565,7 +281565,7 @@ def index_tencent_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tencent_get_serialize( + _param = self._index_teamviewer_get_serialize( page=page, limit=limit, cursor=cursor, @@ -281597,7 +281597,7 @@ def index_tencent_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination", '404': "str", '500': "str", } @@ -281613,7 +281613,7 @@ def index_tencent_get_with_http_info( @validate_call - def index_tencent_get_without_preload_content( + def index_teamviewer_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -281652,9 +281652,9 @@ def index_tencent_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"tencent\" + """Return vulnerability data stored in index \"teamviewer\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tencent index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tencent Vulnerability Risk Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tencent?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tencent?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the teamviewer index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TeamViewer Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/teamviewer?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/teamviewer?cursor=` :param page: set the page number of the response :type page: int @@ -281726,7 +281726,7 @@ def index_tencent_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tencent_get_serialize( + _param = self._index_teamviewer_get_serialize( page=page, limit=limit, cursor=cursor, @@ -281758,7 +281758,7 @@ def index_tencent_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination", '404': "str", '500': "str", } @@ -281769,7 +281769,7 @@ def index_tencent_get_without_preload_content( return response_data.response - def _index_tencent_get_serialize( + def _index_teamviewer_get_serialize( self, page, limit, @@ -281937,7 +281937,7 @@ def _index_tencent_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/tencent', + resource_path='/v3/index/teamviewer', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -281954,7 +281954,7 @@ def _index_tencent_get_serialize( @validate_call - def index_thales_get( + def index_tenable_research_advisories_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -281992,10 +281992,10 @@ def index_thales_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination: - """Return vulnerability data stored in index \"thales\" + ) -> RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"tenable-research-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the thales index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Thales Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/thales?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/thales?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tenable-research-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tenable Research Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tenable-research-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tenable-research-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -282067,7 +282067,7 @@ def index_thales_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_thales_get_serialize( + _param = self._index_tenable_research_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -282099,7 +282099,7 @@ def index_thales_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -282115,7 +282115,7 @@ def index_thales_get( @validate_call - def index_thales_get_with_http_info( + def index_tenable_research_advisories_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -282153,10 +282153,10 @@ def index_thales_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination]: - """Return vulnerability data stored in index \"thales\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"tenable-research-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the thales index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Thales Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/thales?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/thales?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tenable-research-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tenable Research Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tenable-research-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tenable-research-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -282228,7 +282228,7 @@ def index_thales_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_thales_get_serialize( + _param = self._index_tenable_research_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -282260,7 +282260,7 @@ def index_thales_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -282276,7 +282276,7 @@ def index_thales_get_with_http_info( @validate_call - def index_thales_get_without_preload_content( + def index_tenable_research_advisories_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -282315,9 +282315,9 @@ def index_thales_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"thales\" + """Return vulnerability data stored in index \"tenable-research-advisories\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the thales index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Thales Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/thales?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/thales?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tenable-research-advisories index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tenable Research Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tenable-research-advisories?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tenable-research-advisories?cursor=` :param page: set the page number of the response :type page: int @@ -282389,7 +282389,7 @@ def index_thales_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_thales_get_serialize( + _param = self._index_tenable_research_advisories_get_serialize( page=page, limit=limit, cursor=cursor, @@ -282421,7 +282421,7 @@ def index_thales_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -282432,7 +282432,7 @@ def index_thales_get_without_preload_content( return response_data.response - def _index_thales_get_serialize( + def _index_tenable_research_advisories_get_serialize( self, page, limit, @@ -282600,7 +282600,7 @@ def _index_thales_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/thales', + resource_path='/v3/index/tenable-research-advisories', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -282617,7 +282617,7 @@ def _index_thales_get_serialize( @validate_call - def index_themissinglink_get( + def index_tencent_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -282655,10 +282655,10 @@ def index_themissinglink_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination: - """Return vulnerability data stored in index \"themissinglink\" + ) -> RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination: + """Return vulnerability data stored in index \"tencent\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the themissinglink index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** the missing link Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/themissinglink?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/themissinglink?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tencent index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tencent Vulnerability Risk Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tencent?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tencent?cursor=` :param page: set the page number of the response :type page: int @@ -282730,7 +282730,7 @@ def index_themissinglink_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_themissinglink_get_serialize( + _param = self._index_tencent_get_serialize( page=page, limit=limit, cursor=cursor, @@ -282762,7 +282762,7 @@ def index_themissinglink_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination", '404': "str", '500': "str", } @@ -282778,7 +282778,7 @@ def index_themissinglink_get( @validate_call - def index_themissinglink_get_with_http_info( + def index_tencent_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -282816,10 +282816,10 @@ def index_themissinglink_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination]: - """Return vulnerability data stored in index \"themissinglink\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination]: + """Return vulnerability data stored in index \"tencent\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the themissinglink index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** the missing link Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/themissinglink?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/themissinglink?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tencent index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tencent Vulnerability Risk Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tencent?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tencent?cursor=` :param page: set the page number of the response :type page: int @@ -282891,7 +282891,7 @@ def index_themissinglink_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_themissinglink_get_serialize( + _param = self._index_tencent_get_serialize( page=page, limit=limit, cursor=cursor, @@ -282923,7 +282923,7 @@ def index_themissinglink_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination", '404': "str", '500': "str", } @@ -282939,7 +282939,7 @@ def index_themissinglink_get_with_http_info( @validate_call - def index_themissinglink_get_without_preload_content( + def index_tencent_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -282978,9 +282978,9 @@ def index_themissinglink_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"themissinglink\" + """Return vulnerability data stored in index \"tencent\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the themissinglink index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** the missing link Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/themissinglink?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/themissinglink?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tencent index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Tencent Vulnerability Risk Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tencent?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tencent?cursor=` :param page: set the page number of the response :type page: int @@ -283052,7 +283052,7 @@ def index_themissinglink_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_themissinglink_get_serialize( + _param = self._index_tencent_get_serialize( page=page, limit=limit, cursor=cursor, @@ -283084,7 +283084,7 @@ def index_themissinglink_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination", '404': "str", '500': "str", } @@ -283095,7 +283095,7 @@ def index_themissinglink_get_without_preload_content( return response_data.response - def _index_themissinglink_get_serialize( + def _index_tencent_get_serialize( self, page, limit, @@ -283263,7 +283263,7 @@ def _index_themissinglink_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/themissinglink', + resource_path='/v3/index/tencent', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -283280,7 +283280,7 @@ def _index_themissinglink_get_serialize( @validate_call - def index_thermo_fisher_get( + def index_thales_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -283318,10 +283318,10 @@ def index_thermo_fisher_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination: - """Return vulnerability data stored in index \"thermo-fisher\" + ) -> RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination: + """Return vulnerability data stored in index \"thales\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the thermo-fisher index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Thermo Fisher Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/thermo-fisher?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/thermo-fisher?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the thales index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Thales Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/thales?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/thales?cursor=` :param page: set the page number of the response :type page: int @@ -283393,7 +283393,7 @@ def index_thermo_fisher_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_thermo_fisher_get_serialize( + _param = self._index_thales_get_serialize( page=page, limit=limit, cursor=cursor, @@ -283425,7 +283425,7 @@ def index_thermo_fisher_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination", '404': "str", '500': "str", } @@ -283441,7 +283441,7 @@ def index_thermo_fisher_get( @validate_call - def index_thermo_fisher_get_with_http_info( + def index_thales_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -283479,10 +283479,10 @@ def index_thermo_fisher_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination]: - """Return vulnerability data stored in index \"thermo-fisher\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination]: + """Return vulnerability data stored in index \"thales\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the thermo-fisher index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Thermo Fisher Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/thermo-fisher?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/thermo-fisher?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the thales index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Thales Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/thales?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/thales?cursor=` :param page: set the page number of the response :type page: int @@ -283554,7 +283554,7 @@ def index_thermo_fisher_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_thermo_fisher_get_serialize( + _param = self._index_thales_get_serialize( page=page, limit=limit, cursor=cursor, @@ -283586,7 +283586,7 @@ def index_thermo_fisher_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination", '404': "str", '500': "str", } @@ -283602,7 +283602,7 @@ def index_thermo_fisher_get_with_http_info( @validate_call - def index_thermo_fisher_get_without_preload_content( + def index_thales_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -283641,9 +283641,9 @@ def index_thermo_fisher_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"thermo-fisher\" + """Return vulnerability data stored in index \"thales\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the thermo-fisher index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Thermo Fisher Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/thermo-fisher?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/thermo-fisher?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the thales index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Thales Security Updates ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/thales?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/thales?cursor=` :param page: set the page number of the response :type page: int @@ -283715,7 +283715,7 @@ def index_thermo_fisher_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_thermo_fisher_get_serialize( + _param = self._index_thales_get_serialize( page=page, limit=limit, cursor=cursor, @@ -283747,7 +283747,7 @@ def index_thermo_fisher_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination", '404': "str", '500': "str", } @@ -283758,7 +283758,7 @@ def index_thermo_fisher_get_without_preload_content( return response_data.response - def _index_thermo_fisher_get_serialize( + def _index_thales_get_serialize( self, page, limit, @@ -283926,7 +283926,7 @@ def _index_thermo_fisher_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/thermo-fisher', + resource_path='/v3/index/thales', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -283943,7 +283943,7 @@ def _index_thermo_fisher_get_serialize( @validate_call - def index_threat_actors_get( + def index_themissinglink_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -283981,10 +283981,10 @@ def index_threat_actors_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination: - """Return vulnerability data stored in index \"threat-actors\" + ) -> RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination: + """Return vulnerability data stored in index \"themissinglink\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the threat-actors index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Threat Actors Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/threat-actors?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/threat-actors?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the themissinglink index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** the missing link Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/themissinglink?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/themissinglink?cursor=` :param page: set the page number of the response :type page: int @@ -284056,7 +284056,7 @@ def index_threat_actors_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_threat_actors_get_serialize( + _param = self._index_themissinglink_get_serialize( page=page, limit=limit, cursor=cursor, @@ -284088,7 +284088,7 @@ def index_threat_actors_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination", '404': "str", '500': "str", } @@ -284104,7 +284104,7 @@ def index_threat_actors_get( @validate_call - def index_threat_actors_get_with_http_info( + def index_themissinglink_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -284142,10 +284142,10 @@ def index_threat_actors_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination]: - """Return vulnerability data stored in index \"threat-actors\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination]: + """Return vulnerability data stored in index \"themissinglink\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the threat-actors index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Threat Actors Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/threat-actors?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/threat-actors?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the themissinglink index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** the missing link Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/themissinglink?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/themissinglink?cursor=` :param page: set the page number of the response :type page: int @@ -284217,7 +284217,7 @@ def index_threat_actors_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_threat_actors_get_serialize( + _param = self._index_themissinglink_get_serialize( page=page, limit=limit, cursor=cursor, @@ -284249,7 +284249,7 @@ def index_threat_actors_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination", '404': "str", '500': "str", } @@ -284265,7 +284265,7 @@ def index_threat_actors_get_with_http_info( @validate_call - def index_threat_actors_get_without_preload_content( + def index_themissinglink_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -284304,9 +284304,9 @@ def index_threat_actors_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"threat-actors\" + """Return vulnerability data stored in index \"themissinglink\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the threat-actors index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Threat Actors Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/threat-actors?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/threat-actors?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the themissinglink index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** the missing link Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/themissinglink?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/themissinglink?cursor=` :param page: set the page number of the response :type page: int @@ -284378,7 +284378,7 @@ def index_threat_actors_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_threat_actors_get_serialize( + _param = self._index_themissinglink_get_serialize( page=page, limit=limit, cursor=cursor, @@ -284410,7 +284410,7 @@ def index_threat_actors_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination", '404': "str", '500': "str", } @@ -284421,7 +284421,7 @@ def index_threat_actors_get_without_preload_content( return response_data.response - def _index_threat_actors_get_serialize( + def _index_themissinglink_get_serialize( self, page, limit, @@ -284589,7 +284589,7 @@ def _index_threat_actors_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/threat-actors', + resource_path='/v3/index/themissinglink', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -284606,7 +284606,7 @@ def _index_threat_actors_get_serialize( @validate_call - def index_ti_get( + def index_thermo_fisher_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -284644,10 +284644,10 @@ def index_ti_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination: - """Return vulnerability data stored in index \"ti\" + ) -> RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination: + """Return vulnerability data stored in index \"thermo-fisher\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Texas Instruments Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ti?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the thermo-fisher index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Thermo Fisher Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/thermo-fisher?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/thermo-fisher?cursor=` :param page: set the page number of the response :type page: int @@ -284719,7 +284719,7 @@ def index_ti_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ti_get_serialize( + _param = self._index_thermo_fisher_get_serialize( page=page, limit=limit, cursor=cursor, @@ -284751,7 +284751,7 @@ def index_ti_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination", '404': "str", '500': "str", } @@ -284767,7 +284767,7 @@ def index_ti_get( @validate_call - def index_ti_get_with_http_info( + def index_thermo_fisher_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -284805,10 +284805,10 @@ def index_ti_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination]: - """Return vulnerability data stored in index \"ti\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination]: + """Return vulnerability data stored in index \"thermo-fisher\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Texas Instruments Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ti?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the thermo-fisher index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Thermo Fisher Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/thermo-fisher?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/thermo-fisher?cursor=` :param page: set the page number of the response :type page: int @@ -284880,7 +284880,7 @@ def index_ti_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ti_get_serialize( + _param = self._index_thermo_fisher_get_serialize( page=page, limit=limit, cursor=cursor, @@ -284912,7 +284912,7 @@ def index_ti_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination", '404': "str", '500': "str", } @@ -284928,7 +284928,7 @@ def index_ti_get_with_http_info( @validate_call - def index_ti_get_without_preload_content( + def index_thermo_fisher_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -284967,9 +284967,9 @@ def index_ti_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ti\" + """Return vulnerability data stored in index \"thermo-fisher\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Texas Instruments Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ti?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the thermo-fisher index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Thermo Fisher Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/thermo-fisher?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/thermo-fisher?cursor=` :param page: set the page number of the response :type page: int @@ -285041,7 +285041,7 @@ def index_ti_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ti_get_serialize( + _param = self._index_thermo_fisher_get_serialize( page=page, limit=limit, cursor=cursor, @@ -285073,7 +285073,7 @@ def index_ti_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination", '404': "str", '500': "str", } @@ -285084,7 +285084,7 @@ def index_ti_get_without_preload_content( return response_data.response - def _index_ti_get_serialize( + def _index_thermo_fisher_get_serialize( self, page, limit, @@ -285252,7 +285252,7 @@ def _index_ti_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ti', + resource_path='/v3/index/thermo-fisher', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -285269,7 +285269,7 @@ def _index_ti_get_serialize( @validate_call - def index_tibco_get( + def index_threat_actors_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -285307,10 +285307,10 @@ def index_tibco_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination: - """Return vulnerability data stored in index \"tibco\" + ) -> RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination: + """Return vulnerability data stored in index \"threat-actors\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tibco index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TIBCO Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tibco?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tibco?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the threat-actors index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Threat Actors Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/threat-actors?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/threat-actors?cursor=` :param page: set the page number of the response :type page: int @@ -285382,7 +285382,7 @@ def index_tibco_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tibco_get_serialize( + _param = self._index_threat_actors_get_serialize( page=page, limit=limit, cursor=cursor, @@ -285414,7 +285414,7 @@ def index_tibco_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination", '404': "str", '500': "str", } @@ -285430,7 +285430,7 @@ def index_tibco_get( @validate_call - def index_tibco_get_with_http_info( + def index_threat_actors_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -285468,10 +285468,10 @@ def index_tibco_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination]: - """Return vulnerability data stored in index \"tibco\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination]: + """Return vulnerability data stored in index \"threat-actors\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tibco index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TIBCO Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tibco?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tibco?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the threat-actors index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Threat Actors Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/threat-actors?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/threat-actors?cursor=` :param page: set the page number of the response :type page: int @@ -285543,7 +285543,7 @@ def index_tibco_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tibco_get_serialize( + _param = self._index_threat_actors_get_serialize( page=page, limit=limit, cursor=cursor, @@ -285575,7 +285575,7 @@ def index_tibco_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination", '404': "str", '500': "str", } @@ -285591,7 +285591,7 @@ def index_tibco_get_with_http_info( @validate_call - def index_tibco_get_without_preload_content( + def index_threat_actors_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -285630,9 +285630,9 @@ def index_tibco_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"tibco\" + """Return vulnerability data stored in index \"threat-actors\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tibco index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TIBCO Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tibco?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tibco?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the threat-actors index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Threat Actors Data ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/threat-actors?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/threat-actors?cursor=` :param page: set the page number of the response :type page: int @@ -285704,7 +285704,7 @@ def index_tibco_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tibco_get_serialize( + _param = self._index_threat_actors_get_serialize( page=page, limit=limit, cursor=cursor, @@ -285736,7 +285736,7 @@ def index_tibco_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination", '404': "str", '500': "str", } @@ -285747,7 +285747,7 @@ def index_tibco_get_without_preload_content( return response_data.response - def _index_tibco_get_serialize( + def _index_threat_actors_get_serialize( self, page, limit, @@ -285915,7 +285915,7 @@ def _index_tibco_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/tibco', + resource_path='/v3/index/threat-actors', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -285932,7 +285932,7 @@ def _index_tibco_get_serialize( @validate_call - def index_tp_link_get( + def index_ti_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -285970,10 +285970,10 @@ def index_tp_link_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination: - """Return vulnerability data stored in index \"tp-link\" + ) -> RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination: + """Return vulnerability data stored in index \"ti\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tp-link index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TP-Link Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tp-link?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tp-link?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Texas Instruments Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ti?cursor=` :param page: set the page number of the response :type page: int @@ -286045,7 +286045,7 @@ def index_tp_link_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tp_link_get_serialize( + _param = self._index_ti_get_serialize( page=page, limit=limit, cursor=cursor, @@ -286077,7 +286077,7 @@ def index_tp_link_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination", '404': "str", '500': "str", } @@ -286093,7 +286093,7 @@ def index_tp_link_get( @validate_call - def index_tp_link_get_with_http_info( + def index_ti_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -286131,10 +286131,10 @@ def index_tp_link_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination]: - """Return vulnerability data stored in index \"tp-link\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination]: + """Return vulnerability data stored in index \"ti\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tp-link index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TP-Link Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tp-link?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tp-link?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Texas Instruments Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ti?cursor=` :param page: set the page number of the response :type page: int @@ -286206,7 +286206,7 @@ def index_tp_link_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tp_link_get_serialize( + _param = self._index_ti_get_serialize( page=page, limit=limit, cursor=cursor, @@ -286238,7 +286238,7 @@ def index_tp_link_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination", '404': "str", '500': "str", } @@ -286254,7 +286254,7 @@ def index_tp_link_get_with_http_info( @validate_call - def index_tp_link_get_without_preload_content( + def index_ti_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -286293,9 +286293,9 @@ def index_tp_link_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"tp-link\" + """Return vulnerability data stored in index \"ti\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tp-link index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TP-Link Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tp-link?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tp-link?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Texas Instruments Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ti?cursor=` :param page: set the page number of the response :type page: int @@ -286367,7 +286367,7 @@ def index_tp_link_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_tp_link_get_serialize( + _param = self._index_ti_get_serialize( page=page, limit=limit, cursor=cursor, @@ -286399,7 +286399,7 @@ def index_tp_link_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination", '404': "str", '500': "str", } @@ -286410,7 +286410,7 @@ def index_tp_link_get_without_preload_content( return response_data.response - def _index_tp_link_get_serialize( + def _index_ti_get_serialize( self, page, limit, @@ -286578,7 +286578,7 @@ def _index_tp_link_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/tp-link', + resource_path='/v3/index/ti', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -286595,7 +286595,7 @@ def _index_tp_link_get_serialize( @validate_call - def index_trane_technology_get( + def index_tibco_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -286633,10 +286633,10 @@ def index_trane_technology_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination: - """Return vulnerability data stored in index \"trane-technology\" + ) -> RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination: + """Return vulnerability data stored in index \"tibco\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trane-technology index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trane Technology Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trane-technology?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trane-technology?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tibco index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TIBCO Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tibco?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tibco?cursor=` :param page: set the page number of the response :type page: int @@ -286708,7 +286708,7 @@ def index_trane_technology_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_trane_technology_get_serialize( + _param = self._index_tibco_get_serialize( page=page, limit=limit, cursor=cursor, @@ -286740,7 +286740,7 @@ def index_trane_technology_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination", '404': "str", '500': "str", } @@ -286756,7 +286756,7 @@ def index_trane_technology_get( @validate_call - def index_trane_technology_get_with_http_info( + def index_tibco_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -286794,10 +286794,10 @@ def index_trane_technology_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination]: - """Return vulnerability data stored in index \"trane-technology\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination]: + """Return vulnerability data stored in index \"tibco\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trane-technology index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trane Technology Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trane-technology?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trane-technology?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tibco index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TIBCO Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tibco?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tibco?cursor=` :param page: set the page number of the response :type page: int @@ -286869,7 +286869,7 @@ def index_trane_technology_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_trane_technology_get_serialize( + _param = self._index_tibco_get_serialize( page=page, limit=limit, cursor=cursor, @@ -286901,7 +286901,7 @@ def index_trane_technology_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination", '404': "str", '500': "str", } @@ -286917,7 +286917,7 @@ def index_trane_technology_get_with_http_info( @validate_call - def index_trane_technology_get_without_preload_content( + def index_tibco_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -286956,9 +286956,9 @@ def index_trane_technology_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"trane-technology\" + """Return vulnerability data stored in index \"tibco\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trane-technology index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trane Technology Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trane-technology?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trane-technology?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tibco index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TIBCO Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tibco?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tibco?cursor=` :param page: set the page number of the response :type page: int @@ -287030,7 +287030,7 @@ def index_trane_technology_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_trane_technology_get_serialize( + _param = self._index_tibco_get_serialize( page=page, limit=limit, cursor=cursor, @@ -287062,7 +287062,7 @@ def index_trane_technology_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination", '404': "str", '500': "str", } @@ -287073,7 +287073,7 @@ def index_trane_technology_get_without_preload_content( return response_data.response - def _index_trane_technology_get_serialize( + def _index_tibco_get_serialize( self, page, limit, @@ -287241,7 +287241,7 @@ def _index_trane_technology_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/trane-technology', + resource_path='/v3/index/tibco', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -287258,7 +287258,7 @@ def _index_trane_technology_get_serialize( @validate_call - def index_trendmicro_get( + def index_tp_link_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -287296,10 +287296,10 @@ def index_trendmicro_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination: - """Return vulnerability data stored in index \"trendmicro\" + ) -> RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination: + """Return vulnerability data stored in index \"tp-link\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trendmicro index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trend Micro Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trendmicro?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trendmicro?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tp-link index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TP-Link Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tp-link?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tp-link?cursor=` :param page: set the page number of the response :type page: int @@ -287371,7 +287371,7 @@ def index_trendmicro_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_trendmicro_get_serialize( + _param = self._index_tp_link_get_serialize( page=page, limit=limit, cursor=cursor, @@ -287403,7 +287403,7 @@ def index_trendmicro_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination", '404': "str", '500': "str", } @@ -287419,7 +287419,7 @@ def index_trendmicro_get( @validate_call - def index_trendmicro_get_with_http_info( + def index_tp_link_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -287457,10 +287457,10 @@ def index_trendmicro_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination]: - """Return vulnerability data stored in index \"trendmicro\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination]: + """Return vulnerability data stored in index \"tp-link\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trendmicro index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trend Micro Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trendmicro?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trendmicro?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tp-link index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TP-Link Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tp-link?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tp-link?cursor=` :param page: set the page number of the response :type page: int @@ -287532,7 +287532,7 @@ def index_trendmicro_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_trendmicro_get_serialize( + _param = self._index_tp_link_get_serialize( page=page, limit=limit, cursor=cursor, @@ -287564,7 +287564,7 @@ def index_trendmicro_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination", '404': "str", '500': "str", } @@ -287580,7 +287580,7 @@ def index_trendmicro_get_with_http_info( @validate_call - def index_trendmicro_get_without_preload_content( + def index_tp_link_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -287619,9 +287619,9 @@ def index_trendmicro_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"trendmicro\" + """Return vulnerability data stored in index \"tp-link\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trendmicro index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trend Micro Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trendmicro?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trendmicro?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the tp-link index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** TP-Link Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/tp-link?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/tp-link?cursor=` :param page: set the page number of the response :type page: int @@ -287693,7 +287693,7 @@ def index_trendmicro_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_trendmicro_get_serialize( + _param = self._index_tp_link_get_serialize( page=page, limit=limit, cursor=cursor, @@ -287725,7 +287725,7 @@ def index_trendmicro_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination", '404': "str", '500': "str", } @@ -287736,7 +287736,7 @@ def index_trendmicro_get_without_preload_content( return response_data.response - def _index_trendmicro_get_serialize( + def _index_tp_link_get_serialize( self, page, limit, @@ -287904,7 +287904,7 @@ def _index_trendmicro_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/trendmicro', + resource_path='/v3/index/tp-link', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -287921,7 +287921,7 @@ def _index_trendmicro_get_serialize( @validate_call - def index_trustwave_get( + def index_trane_technology_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -287959,10 +287959,10 @@ def index_trustwave_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination: - """Return vulnerability data stored in index \"trustwave\" + ) -> RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination: + """Return vulnerability data stored in index \"trane-technology\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trustwave index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trustwave Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trustwave?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trustwave?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trane-technology index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trane Technology Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trane-technology?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trane-technology?cursor=` :param page: set the page number of the response :type page: int @@ -288034,7 +288034,7 @@ def index_trustwave_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_trustwave_get_serialize( + _param = self._index_trane_technology_get_serialize( page=page, limit=limit, cursor=cursor, @@ -288066,7 +288066,7 @@ def index_trustwave_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination", '404': "str", '500': "str", } @@ -288082,7 +288082,7 @@ def index_trustwave_get( @validate_call - def index_trustwave_get_with_http_info( + def index_trane_technology_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -288120,10 +288120,10 @@ def index_trustwave_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination]: - """Return vulnerability data stored in index \"trustwave\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination]: + """Return vulnerability data stored in index \"trane-technology\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trustwave index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trustwave Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trustwave?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trustwave?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trane-technology index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trane Technology Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trane-technology?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trane-technology?cursor=` :param page: set the page number of the response :type page: int @@ -288195,7 +288195,7 @@ def index_trustwave_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_trustwave_get_serialize( + _param = self._index_trane_technology_get_serialize( page=page, limit=limit, cursor=cursor, @@ -288227,7 +288227,7 @@ def index_trustwave_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination", '404': "str", '500': "str", } @@ -288243,7 +288243,7 @@ def index_trustwave_get_with_http_info( @validate_call - def index_trustwave_get_without_preload_content( + def index_trane_technology_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -288282,9 +288282,9 @@ def index_trustwave_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"trustwave\" + """Return vulnerability data stored in index \"trane-technology\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trustwave index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trustwave Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trustwave?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trustwave?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trane-technology index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trane Technology Product Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trane-technology?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trane-technology?cursor=` :param page: set the page number of the response :type page: int @@ -288356,7 +288356,7 @@ def index_trustwave_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_trustwave_get_serialize( + _param = self._index_trane_technology_get_serialize( page=page, limit=limit, cursor=cursor, @@ -288388,7 +288388,7 @@ def index_trustwave_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination", '404': "str", '500': "str", } @@ -288399,7 +288399,7 @@ def index_trustwave_get_without_preload_content( return response_data.response - def _index_trustwave_get_serialize( + def _index_trane_technology_get_serialize( self, page, limit, @@ -288567,7 +288567,7 @@ def _index_trustwave_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/trustwave', + resource_path='/v3/index/trane-technology', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -288584,7 +288584,7 @@ def _index_trustwave_get_serialize( @validate_call - def index_twcert_get( + def index_trendmicro_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -288622,10 +288622,10 @@ def index_twcert_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"twcert\" + ) -> RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination: + """Return vulnerability data stored in index \"trendmicro\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the twcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Taiwan CERT Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/twcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/twcert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trendmicro index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trend Micro Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trendmicro?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trendmicro?cursor=` :param page: set the page number of the response :type page: int @@ -288697,7 +288697,7 @@ def index_twcert_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_twcert_get_serialize( + _param = self._index_trendmicro_get_serialize( page=page, limit=limit, cursor=cursor, @@ -288729,7 +288729,7 @@ def index_twcert_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination", '404': "str", '500': "str", } @@ -288745,7 +288745,7 @@ def index_twcert_get( @validate_call - def index_twcert_get_with_http_info( + def index_trendmicro_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -288783,10 +288783,10 @@ def index_twcert_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"twcert\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination]: + """Return vulnerability data stored in index \"trendmicro\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the twcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Taiwan CERT Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/twcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/twcert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trendmicro index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trend Micro Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trendmicro?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trendmicro?cursor=` :param page: set the page number of the response :type page: int @@ -288858,7 +288858,7 @@ def index_twcert_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_twcert_get_serialize( + _param = self._index_trendmicro_get_serialize( page=page, limit=limit, cursor=cursor, @@ -288890,7 +288890,7 @@ def index_twcert_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination", '404': "str", '500': "str", } @@ -288906,7 +288906,7 @@ def index_twcert_get_with_http_info( @validate_call - def index_twcert_get_without_preload_content( + def index_trendmicro_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -288945,9 +288945,9 @@ def index_twcert_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"twcert\" + """Return vulnerability data stored in index \"trendmicro\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the twcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Taiwan CERT Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/twcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/twcert?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trendmicro index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trend Micro Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trendmicro?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trendmicro?cursor=` :param page: set the page number of the response :type page: int @@ -289019,7 +289019,7 @@ def index_twcert_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_twcert_get_serialize( + _param = self._index_trendmicro_get_serialize( page=page, limit=limit, cursor=cursor, @@ -289051,7 +289051,7 @@ def index_twcert_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination", '404': "str", '500': "str", } @@ -289062,7 +289062,7 @@ def index_twcert_get_without_preload_content( return response_data.response - def _index_twcert_get_serialize( + def _index_trendmicro_get_serialize( self, page, limit, @@ -289230,7 +289230,7 @@ def _index_twcert_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/twcert', + resource_path='/v3/index/trendmicro', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -289247,7 +289247,7 @@ def _index_twcert_get_serialize( @validate_call - def index_ubiquiti_get( + def index_trustwave_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -289285,10 +289285,10 @@ def index_ubiquiti_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination: - """Return vulnerability data stored in index \"ubiquiti\" + ) -> RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination: + """Return vulnerability data stored in index \"trustwave\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubiquiti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubiquiti Security Advisory Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubiquiti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubiquiti?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trustwave index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trustwave Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trustwave?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trustwave?cursor=` :param page: set the page number of the response :type page: int @@ -289360,7 +289360,7 @@ def index_ubiquiti_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ubiquiti_get_serialize( + _param = self._index_trustwave_get_serialize( page=page, limit=limit, cursor=cursor, @@ -289392,7 +289392,7 @@ def index_ubiquiti_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination", '404': "str", '500': "str", } @@ -289408,7 +289408,7 @@ def index_ubiquiti_get( @validate_call - def index_ubiquiti_get_with_http_info( + def index_trustwave_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -289446,10 +289446,10 @@ def index_ubiquiti_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination]: - """Return vulnerability data stored in index \"ubiquiti\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination]: + """Return vulnerability data stored in index \"trustwave\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubiquiti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubiquiti Security Advisory Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubiquiti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubiquiti?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trustwave index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trustwave Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trustwave?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trustwave?cursor=` :param page: set the page number of the response :type page: int @@ -289521,7 +289521,7 @@ def index_ubiquiti_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ubiquiti_get_serialize( + _param = self._index_trustwave_get_serialize( page=page, limit=limit, cursor=cursor, @@ -289553,7 +289553,7 @@ def index_ubiquiti_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination", '404': "str", '500': "str", } @@ -289569,7 +289569,7 @@ def index_ubiquiti_get_with_http_info( @validate_call - def index_ubiquiti_get_without_preload_content( + def index_trustwave_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -289608,9 +289608,9 @@ def index_ubiquiti_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ubiquiti\" + """Return vulnerability data stored in index \"trustwave\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubiquiti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubiquiti Security Advisory Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubiquiti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubiquiti?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the trustwave index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Trustwave Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/trustwave?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/trustwave?cursor=` :param page: set the page number of the response :type page: int @@ -289682,7 +289682,7 @@ def index_ubiquiti_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ubiquiti_get_serialize( + _param = self._index_trustwave_get_serialize( page=page, limit=limit, cursor=cursor, @@ -289714,7 +289714,7 @@ def index_ubiquiti_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination", '404': "str", '500': "str", } @@ -289725,7 +289725,7 @@ def index_ubiquiti_get_without_preload_content( return response_data.response - def _index_ubiquiti_get_serialize( + def _index_trustwave_get_serialize( self, page, limit, @@ -289893,7 +289893,7 @@ def _index_ubiquiti_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ubiquiti', + resource_path='/v3/index/trustwave', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -289910,7 +289910,7 @@ def _index_ubiquiti_get_serialize( @validate_call - def index_ubuntu_get( + def index_twcert_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -289948,10 +289948,10 @@ def index_ubuntu_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination: - """Return vulnerability data stored in index \"ubuntu\" + ) -> RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"twcert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubuntu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubuntu Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubuntu?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the twcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Taiwan CERT Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/twcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/twcert?cursor=` :param page: set the page number of the response :type page: int @@ -290023,7 +290023,7 @@ def index_ubuntu_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ubuntu_get_serialize( + _param = self._index_twcert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -290055,7 +290055,7 @@ def index_ubuntu_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -290071,7 +290071,7 @@ def index_ubuntu_get( @validate_call - def index_ubuntu_get_with_http_info( + def index_twcert_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -290109,10 +290109,10 @@ def index_ubuntu_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination]: - """Return vulnerability data stored in index \"ubuntu\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"twcert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubuntu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubuntu Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubuntu?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the twcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Taiwan CERT Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/twcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/twcert?cursor=` :param page: set the page number of the response :type page: int @@ -290184,7 +290184,7 @@ def index_ubuntu_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ubuntu_get_serialize( + _param = self._index_twcert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -290216,7 +290216,7 @@ def index_ubuntu_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -290232,7 +290232,7 @@ def index_ubuntu_get_with_http_info( @validate_call - def index_ubuntu_get_without_preload_content( + def index_twcert_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -290271,9 +290271,9 @@ def index_ubuntu_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ubuntu\" + """Return vulnerability data stored in index \"twcert\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubuntu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubuntu Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubuntu?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the twcert index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Taiwan CERT Vulnerability Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/twcert?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/twcert?cursor=` :param page: set the page number of the response :type page: int @@ -290345,7 +290345,7 @@ def index_ubuntu_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ubuntu_get_serialize( + _param = self._index_twcert_get_serialize( page=page, limit=limit, cursor=cursor, @@ -290377,7 +290377,7 @@ def index_ubuntu_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -290388,7 +290388,7 @@ def index_ubuntu_get_without_preload_content( return response_data.response - def _index_ubuntu_get_serialize( + def _index_twcert_get_serialize( self, page, limit, @@ -290556,7 +290556,7 @@ def _index_ubuntu_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ubuntu', + resource_path='/v3/index/twcert', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -290573,7 +290573,7 @@ def _index_ubuntu_get_serialize( @validate_call - def index_ubuntu_purls_get( + def index_ubiquiti_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -290611,10 +290611,10 @@ def index_ubuntu_purls_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination: - """Return vulnerability data stored in index \"ubuntu-purls\" + ) -> RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination: + """Return vulnerability data stored in index \"ubiquiti\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubuntu-purls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubuntu Purls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu-purls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubuntu-purls?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubiquiti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubiquiti Security Advisory Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubiquiti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubiquiti?cursor=` :param page: set the page number of the response :type page: int @@ -290686,7 +290686,7 @@ def index_ubuntu_purls_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ubuntu_purls_get_serialize( + _param = self._index_ubiquiti_get_serialize( page=page, limit=limit, cursor=cursor, @@ -290718,7 +290718,7 @@ def index_ubuntu_purls_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination", '404': "str", '500': "str", } @@ -290734,7 +290734,7 @@ def index_ubuntu_purls_get( @validate_call - def index_ubuntu_purls_get_with_http_info( + def index_ubiquiti_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -290772,10 +290772,10 @@ def index_ubuntu_purls_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination]: - """Return vulnerability data stored in index \"ubuntu-purls\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination]: + """Return vulnerability data stored in index \"ubiquiti\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubuntu-purls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubuntu Purls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu-purls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubuntu-purls?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubiquiti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubiquiti Security Advisory Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubiquiti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubiquiti?cursor=` :param page: set the page number of the response :type page: int @@ -290847,7 +290847,7 @@ def index_ubuntu_purls_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ubuntu_purls_get_serialize( + _param = self._index_ubiquiti_get_serialize( page=page, limit=limit, cursor=cursor, @@ -290879,7 +290879,7 @@ def index_ubuntu_purls_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination", '404': "str", '500': "str", } @@ -290895,7 +290895,7 @@ def index_ubuntu_purls_get_with_http_info( @validate_call - def index_ubuntu_purls_get_without_preload_content( + def index_ubiquiti_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -290934,9 +290934,9 @@ def index_ubuntu_purls_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"ubuntu-purls\" + """Return vulnerability data stored in index \"ubiquiti\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubuntu-purls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubuntu Purls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu-purls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubuntu-purls?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubiquiti index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubiquiti Security Advisory Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubiquiti?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubiquiti?cursor=` :param page: set the page number of the response :type page: int @@ -291008,7 +291008,7 @@ def index_ubuntu_purls_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_ubuntu_purls_get_serialize( + _param = self._index_ubiquiti_get_serialize( page=page, limit=limit, cursor=cursor, @@ -291040,7 +291040,7 @@ def index_ubuntu_purls_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination", '404': "str", '500': "str", } @@ -291051,7 +291051,7 @@ def index_ubuntu_purls_get_without_preload_content( return response_data.response - def _index_ubuntu_purls_get_serialize( + def _index_ubiquiti_get_serialize( self, page, limit, @@ -291219,7 +291219,7 @@ def _index_ubuntu_purls_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/ubuntu-purls', + resource_path='/v3/index/ubiquiti', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -291236,7 +291236,7 @@ def _index_ubuntu_purls_get_serialize( @validate_call - def index_unify_get( + def index_ubuntu_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -291274,10 +291274,10 @@ def index_unify_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination: - """Return vulnerability data stored in index \"unify\" + ) -> RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination: + """Return vulnerability data stored in index \"ubuntu\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the unify index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Unify Product Security Advisories and Security Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/unify?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/unify?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubuntu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubuntu Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubuntu?cursor=` :param page: set the page number of the response :type page: int @@ -291349,7 +291349,7 @@ def index_unify_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_unify_get_serialize( + _param = self._index_ubuntu_get_serialize( page=page, limit=limit, cursor=cursor, @@ -291381,7 +291381,7 @@ def index_unify_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination", '404': "str", '500': "str", } @@ -291397,7 +291397,7 @@ def index_unify_get( @validate_call - def index_unify_get_with_http_info( + def index_ubuntu_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -291435,10 +291435,10 @@ def index_unify_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination]: - """Return vulnerability data stored in index \"unify\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination]: + """Return vulnerability data stored in index \"ubuntu\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the unify index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Unify Product Security Advisories and Security Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/unify?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/unify?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubuntu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubuntu Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubuntu?cursor=` :param page: set the page number of the response :type page: int @@ -291510,7 +291510,7 @@ def index_unify_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_unify_get_serialize( + _param = self._index_ubuntu_get_serialize( page=page, limit=limit, cursor=cursor, @@ -291542,7 +291542,7 @@ def index_unify_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination", '404': "str", '500': "str", } @@ -291558,7 +291558,7 @@ def index_unify_get_with_http_info( @validate_call - def index_unify_get_without_preload_content( + def index_ubuntu_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -291597,9 +291597,9 @@ def index_unify_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"unify\" + """Return vulnerability data stored in index \"ubuntu\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the unify index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Unify Product Security Advisories and Security Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/unify?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/unify?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubuntu index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubuntu Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubuntu?cursor=` :param page: set the page number of the response :type page: int @@ -291671,7 +291671,7 @@ def index_unify_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_unify_get_serialize( + _param = self._index_ubuntu_get_serialize( page=page, limit=limit, cursor=cursor, @@ -291703,7 +291703,7 @@ def index_unify_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination", '404': "str", '500': "str", } @@ -291714,7 +291714,7 @@ def index_unify_get_without_preload_content( return response_data.response - def _index_unify_get_serialize( + def _index_ubuntu_get_serialize( self, page, limit, @@ -291882,7 +291882,7 @@ def _index_unify_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/unify', + resource_path='/v3/index/ubuntu', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -291899,7 +291899,7 @@ def _index_unify_get_serialize( @validate_call - def index_unisoc_get( + def index_ubuntu_purls_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -291937,10 +291937,10 @@ def index_unisoc_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination: - """Return vulnerability data stored in index \"unisoc\" + ) -> RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination: + """Return vulnerability data stored in index \"ubuntu-purls\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the unisoc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** UNISOC Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/unisoc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/unisoc?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubuntu-purls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubuntu Purls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu-purls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubuntu-purls?cursor=` :param page: set the page number of the response :type page: int @@ -292012,7 +292012,7 @@ def index_unisoc_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_unisoc_get_serialize( + _param = self._index_ubuntu_purls_get_serialize( page=page, limit=limit, cursor=cursor, @@ -292044,7 +292044,7 @@ def index_unisoc_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination", + '200': "RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination", '404': "str", '500': "str", } @@ -292060,7 +292060,7 @@ def index_unisoc_get( @validate_call - def index_unisoc_get_with_http_info( + def index_ubuntu_purls_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -292098,10 +292098,10 @@ def index_unisoc_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination]: - """Return vulnerability data stored in index \"unisoc\" + ) -> ApiResponse[RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination]: + """Return vulnerability data stored in index \"ubuntu-purls\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the unisoc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** UNISOC Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/unisoc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/unisoc?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubuntu-purls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubuntu Purls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu-purls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubuntu-purls?cursor=` :param page: set the page number of the response :type page: int @@ -292173,7 +292173,7 @@ def index_unisoc_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_unisoc_get_serialize( + _param = self._index_ubuntu_purls_get_serialize( page=page, limit=limit, cursor=cursor, @@ -292205,7 +292205,7 @@ def index_unisoc_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination", + '200': "RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination", '404': "str", '500': "str", } @@ -292221,7 +292221,7 @@ def index_unisoc_get_with_http_info( @validate_call - def index_unisoc_get_without_preload_content( + def index_ubuntu_purls_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -292260,9 +292260,9 @@ def index_unisoc_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"unisoc\" + """Return vulnerability data stored in index \"ubuntu-purls\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the unisoc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** UNISOC Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/unisoc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/unisoc?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the ubuntu-purls index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Ubuntu Purls ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu-purls?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/ubuntu-purls?cursor=` :param page: set the page number of the response :type page: int @@ -292334,7 +292334,7 @@ def index_unisoc_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_unisoc_get_serialize( + _param = self._index_ubuntu_purls_get_serialize( page=page, limit=limit, cursor=cursor, @@ -292366,7 +292366,7 @@ def index_unisoc_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination", + '200': "RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination", '404': "str", '500': "str", } @@ -292377,7 +292377,7 @@ def index_unisoc_get_without_preload_content( return response_data.response - def _index_unisoc_get_serialize( + def _index_ubuntu_purls_get_serialize( self, page, limit, @@ -292545,7 +292545,7 @@ def _index_unisoc_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/unisoc', + resource_path='/v3/index/ubuntu-purls', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -292562,7 +292562,7 @@ def _index_unisoc_get_serialize( @validate_call - def index_usd_get( + def index_unify_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -292600,10 +292600,10 @@ def index_usd_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination: - """Return vulnerability data stored in index \"usd\" + ) -> RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination: + """Return vulnerability data stored in index \"unify\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the usd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** usd Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/usd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/usd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the unify index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Unify Product Security Advisories and Security Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/unify?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/unify?cursor=` :param page: set the page number of the response :type page: int @@ -292675,7 +292675,7 @@ def index_usd_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_usd_get_serialize( + _param = self._index_unify_get_serialize( page=page, limit=limit, cursor=cursor, @@ -292707,7 +292707,7 @@ def index_usd_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination", '404': "str", '500': "str", } @@ -292723,7 +292723,7 @@ def index_usd_get( @validate_call - def index_usd_get_with_http_info( + def index_unify_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -292761,10 +292761,10 @@ def index_usd_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination]: - """Return vulnerability data stored in index \"usd\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination]: + """Return vulnerability data stored in index \"unify\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the usd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** usd Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/usd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/usd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the unify index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Unify Product Security Advisories and Security Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/unify?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/unify?cursor=` :param page: set the page number of the response :type page: int @@ -292836,7 +292836,7 @@ def index_usd_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_usd_get_serialize( + _param = self._index_unify_get_serialize( page=page, limit=limit, cursor=cursor, @@ -292868,7 +292868,7 @@ def index_usd_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination", '404': "str", '500': "str", } @@ -292884,7 +292884,7 @@ def index_usd_get_with_http_info( @validate_call - def index_usd_get_without_preload_content( + def index_unify_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -292923,9 +292923,9 @@ def index_usd_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"usd\" + """Return vulnerability data stored in index \"unify\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the usd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** usd Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/usd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/usd?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the unify index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Unify Product Security Advisories and Security Notes ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/unify?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/unify?cursor=` :param page: set the page number of the response :type page: int @@ -292997,7 +292997,7 @@ def index_usd_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_usd_get_serialize( + _param = self._index_unify_get_serialize( page=page, limit=limit, cursor=cursor, @@ -293029,7 +293029,7 @@ def index_usd_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination", '404': "str", '500': "str", } @@ -293040,7 +293040,7 @@ def index_usd_get_without_preload_content( return response_data.response - def _index_usd_get_serialize( + def _index_unify_get_serialize( self, page, limit, @@ -293208,7 +293208,7 @@ def _index_usd_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/usd', + resource_path='/v3/index/unify', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -293225,7 +293225,7 @@ def _index_usd_get_serialize( @validate_call - def index_usom_get( + def index_unisoc_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -293263,10 +293263,10 @@ def index_usom_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"usom\" + ) -> RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination: + """Return vulnerability data stored in index \"unisoc\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the usom index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** USOM Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/usom?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/usom?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the unisoc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** UNISOC Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/unisoc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/unisoc?cursor=` :param page: set the page number of the response :type page: int @@ -293338,7 +293338,7 @@ def index_usom_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_usom_get_serialize( + _param = self._index_unisoc_get_serialize( page=page, limit=limit, cursor=cursor, @@ -293370,7 +293370,7 @@ def index_usom_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination", '404': "str", '500': "str", } @@ -293386,7 +293386,7 @@ def index_usom_get( @validate_call - def index_usom_get_with_http_info( + def index_unisoc_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -293424,10 +293424,10 @@ def index_usom_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"usom\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination]: + """Return vulnerability data stored in index \"unisoc\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the usom index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** USOM Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/usom?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/usom?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the unisoc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** UNISOC Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/unisoc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/unisoc?cursor=` :param page: set the page number of the response :type page: int @@ -293499,7 +293499,7 @@ def index_usom_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_usom_get_serialize( + _param = self._index_unisoc_get_serialize( page=page, limit=limit, cursor=cursor, @@ -293531,7 +293531,7 @@ def index_usom_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination", '404': "str", '500': "str", } @@ -293547,7 +293547,7 @@ def index_usom_get_with_http_info( @validate_call - def index_usom_get_without_preload_content( + def index_unisoc_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -293586,9 +293586,9 @@ def index_usom_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"usom\" + """Return vulnerability data stored in index \"unisoc\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the usom index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** USOM Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/usom?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/usom?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the unisoc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** UNISOC Security Bulletins ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/unisoc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/unisoc?cursor=` :param page: set the page number of the response :type page: int @@ -293660,7 +293660,7 @@ def index_usom_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_usom_get_serialize( + _param = self._index_unisoc_get_serialize( page=page, limit=limit, cursor=cursor, @@ -293692,7 +293692,7 @@ def index_usom_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination", '404': "str", '500': "str", } @@ -293703,7 +293703,7 @@ def index_usom_get_without_preload_content( return response_data.response - def _index_usom_get_serialize( + def _index_unisoc_get_serialize( self, page, limit, @@ -293871,7 +293871,7 @@ def _index_usom_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/usom', + resource_path='/v3/index/unisoc', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -293888,7 +293888,7 @@ def _index_usom_get_serialize( @validate_call - def index_vandyke_get( + def index_usd_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -293926,10 +293926,10 @@ def index_vandyke_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination: - """Return vulnerability data stored in index \"vandyke\" + ) -> RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination: + """Return vulnerability data stored in index \"usd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vandyke index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VanDyke Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vandyke?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vandyke?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the usd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** usd Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/usd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/usd?cursor=` :param page: set the page number of the response :type page: int @@ -294001,7 +294001,7 @@ def index_vandyke_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vandyke_get_serialize( + _param = self._index_usd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -294033,7 +294033,7 @@ def index_vandyke_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination", '404': "str", '500': "str", } @@ -294049,7 +294049,7 @@ def index_vandyke_get( @validate_call - def index_vandyke_get_with_http_info( + def index_usd_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -294087,10 +294087,10 @@ def index_vandyke_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination]: - """Return vulnerability data stored in index \"vandyke\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination]: + """Return vulnerability data stored in index \"usd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vandyke index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VanDyke Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vandyke?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vandyke?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the usd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** usd Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/usd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/usd?cursor=` :param page: set the page number of the response :type page: int @@ -294162,7 +294162,7 @@ def index_vandyke_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vandyke_get_serialize( + _param = self._index_usd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -294194,7 +294194,7 @@ def index_vandyke_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination", '404': "str", '500': "str", } @@ -294210,7 +294210,7 @@ def index_vandyke_get_with_http_info( @validate_call - def index_vandyke_get_without_preload_content( + def index_usd_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -294249,9 +294249,9 @@ def index_vandyke_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"vandyke\" + """Return vulnerability data stored in index \"usd\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vandyke index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VanDyke Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vandyke?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vandyke?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the usd index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** usd Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/usd?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/usd?cursor=` :param page: set the page number of the response :type page: int @@ -294323,7 +294323,7 @@ def index_vandyke_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vandyke_get_serialize( + _param = self._index_usd_get_serialize( page=page, limit=limit, cursor=cursor, @@ -294355,7 +294355,7 @@ def index_vandyke_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination", '404': "str", '500': "str", } @@ -294366,7 +294366,7 @@ def index_vandyke_get_without_preload_content( return response_data.response - def _index_vandyke_get_serialize( + def _index_usd_get_serialize( self, page, limit, @@ -294534,7 +294534,7 @@ def _index_vandyke_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/vandyke', + resource_path='/v3/index/usd', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -294551,7 +294551,7 @@ def _index_vandyke_get_serialize( @validate_call - def index_vapidlabs_get( + def index_usom_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -294589,10 +294589,10 @@ def index_vapidlabs_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"vapidlabs\" + ) -> RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"usom\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vapidlabs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VapidLabs Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vapidlabs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vapidlabs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the usom index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** USOM Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/usom?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/usom?cursor=` :param page: set the page number of the response :type page: int @@ -294664,7 +294664,7 @@ def index_vapidlabs_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vapidlabs_get_serialize( + _param = self._index_usom_get_serialize( page=page, limit=limit, cursor=cursor, @@ -294696,7 +294696,7 @@ def index_vapidlabs_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -294712,7 +294712,7 @@ def index_vapidlabs_get( @validate_call - def index_vapidlabs_get_with_http_info( + def index_usom_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -294750,10 +294750,10 @@ def index_vapidlabs_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"vapidlabs\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"usom\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vapidlabs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VapidLabs Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vapidlabs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vapidlabs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the usom index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** USOM Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/usom?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/usom?cursor=` :param page: set the page number of the response :type page: int @@ -294825,7 +294825,7 @@ def index_vapidlabs_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vapidlabs_get_serialize( + _param = self._index_usom_get_serialize( page=page, limit=limit, cursor=cursor, @@ -294857,7 +294857,7 @@ def index_vapidlabs_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -294873,7 +294873,7 @@ def index_vapidlabs_get_with_http_info( @validate_call - def index_vapidlabs_get_without_preload_content( + def index_usom_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -294912,9 +294912,9 @@ def index_vapidlabs_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"vapidlabs\" + """Return vulnerability data stored in index \"usom\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vapidlabs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VapidLabs Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vapidlabs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vapidlabs?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the usom index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** USOM Security Notices ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/usom?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/usom?cursor=` :param page: set the page number of the response :type page: int @@ -294986,7 +294986,7 @@ def index_vapidlabs_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vapidlabs_get_serialize( + _param = self._index_usom_get_serialize( page=page, limit=limit, cursor=cursor, @@ -295018,7 +295018,7 @@ def index_vapidlabs_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -295029,7 +295029,7 @@ def index_vapidlabs_get_without_preload_content( return response_data.response - def _index_vapidlabs_get_serialize( + def _index_usom_get_serialize( self, page, limit, @@ -295197,7 +295197,7 @@ def _index_vapidlabs_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/vapidlabs', + resource_path='/v3/index/usom', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -295214,7 +295214,7 @@ def _index_vapidlabs_get_serialize( @validate_call - def index_vc_cpe_dictionary_get( + def index_vandyke_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -295252,10 +295252,10 @@ def index_vc_cpe_dictionary_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination: - """Return vulnerability data stored in index \"vc-cpe-dictionary\" + ) -> RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination: + """Return vulnerability data stored in index \"vandyke\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vc-cpe-dictionary index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck CPE Dictionary ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vc-cpe-dictionary?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vc-cpe-dictionary?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vandyke index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VanDyke Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vandyke?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vandyke?cursor=` :param page: set the page number of the response :type page: int @@ -295327,7 +295327,7 @@ def index_vc_cpe_dictionary_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vc_cpe_dictionary_get_serialize( + _param = self._index_vandyke_get_serialize( page=page, limit=limit, cursor=cursor, @@ -295359,7 +295359,7 @@ def index_vc_cpe_dictionary_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination", '404': "str", '500': "str", } @@ -295375,7 +295375,7 @@ def index_vc_cpe_dictionary_get( @validate_call - def index_vc_cpe_dictionary_get_with_http_info( + def index_vandyke_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -295413,10 +295413,10 @@ def index_vc_cpe_dictionary_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination]: - """Return vulnerability data stored in index \"vc-cpe-dictionary\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination]: + """Return vulnerability data stored in index \"vandyke\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vc-cpe-dictionary index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck CPE Dictionary ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vc-cpe-dictionary?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vc-cpe-dictionary?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vandyke index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VanDyke Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vandyke?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vandyke?cursor=` :param page: set the page number of the response :type page: int @@ -295488,7 +295488,7 @@ def index_vc_cpe_dictionary_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vc_cpe_dictionary_get_serialize( + _param = self._index_vandyke_get_serialize( page=page, limit=limit, cursor=cursor, @@ -295520,7 +295520,7 @@ def index_vc_cpe_dictionary_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination", '404': "str", '500': "str", } @@ -295536,7 +295536,7 @@ def index_vc_cpe_dictionary_get_with_http_info( @validate_call - def index_vc_cpe_dictionary_get_without_preload_content( + def index_vandyke_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -295575,9 +295575,9 @@ def index_vc_cpe_dictionary_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"vc-cpe-dictionary\" + """Return vulnerability data stored in index \"vandyke\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vc-cpe-dictionary index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck CPE Dictionary ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vc-cpe-dictionary?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vc-cpe-dictionary?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vandyke index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VanDyke Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vandyke?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vandyke?cursor=` :param page: set the page number of the response :type page: int @@ -295649,7 +295649,7 @@ def index_vc_cpe_dictionary_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vc_cpe_dictionary_get_serialize( + _param = self._index_vandyke_get_serialize( page=page, limit=limit, cursor=cursor, @@ -295681,7 +295681,7 @@ def index_vc_cpe_dictionary_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination", '404': "str", '500': "str", } @@ -295692,7 +295692,7 @@ def index_vc_cpe_dictionary_get_without_preload_content( return response_data.response - def _index_vc_cpe_dictionary_get_serialize( + def _index_vandyke_get_serialize( self, page, limit, @@ -295860,7 +295860,7 @@ def _index_vc_cpe_dictionary_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/vc-cpe-dictionary', + resource_path='/v3/index/vandyke', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -295877,7 +295877,7 @@ def _index_vc_cpe_dictionary_get_serialize( @validate_call - def index_vde_get( + def index_vapidlabs_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -295915,10 +295915,10 @@ def index_vde_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"vde\" + ) -> RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"vapidlabs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vde index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VDE CERT Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vde?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vde?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vapidlabs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VapidLabs Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vapidlabs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vapidlabs?cursor=` :param page: set the page number of the response :type page: int @@ -295990,7 +295990,7 @@ def index_vde_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vde_get_serialize( + _param = self._index_vapidlabs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -296022,7 +296022,7 @@ def index_vde_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -296038,7 +296038,7 @@ def index_vde_get( @validate_call - def index_vde_get_with_http_info( + def index_vapidlabs_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -296076,10 +296076,10 @@ def index_vde_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"vde\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"vapidlabs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vde index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VDE CERT Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vde?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vde?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vapidlabs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VapidLabs Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vapidlabs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vapidlabs?cursor=` :param page: set the page number of the response :type page: int @@ -296151,7 +296151,7 @@ def index_vde_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vde_get_serialize( + _param = self._index_vapidlabs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -296183,7 +296183,7 @@ def index_vde_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -296199,7 +296199,7 @@ def index_vde_get_with_http_info( @validate_call - def index_vde_get_without_preload_content( + def index_vapidlabs_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -296238,9 +296238,9 @@ def index_vde_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"vde\" + """Return vulnerability data stored in index \"vapidlabs\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vde index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VDE CERT Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vde?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vde?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vapidlabs index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VapidLabs Vulnerabilities ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vapidlabs?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vapidlabs?cursor=` :param page: set the page number of the response :type page: int @@ -296312,7 +296312,7 @@ def index_vde_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vde_get_serialize( + _param = self._index_vapidlabs_get_serialize( page=page, limit=limit, cursor=cursor, @@ -296344,7 +296344,7 @@ def index_vde_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -296355,7 +296355,7 @@ def index_vde_get_without_preload_content( return response_data.response - def _index_vde_get_serialize( + def _index_vapidlabs_get_serialize( self, page, limit, @@ -296523,7 +296523,7 @@ def _index_vde_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/vde', + resource_path='/v3/index/vapidlabs', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -296540,7 +296540,7 @@ def _index_vde_get_serialize( @validate_call - def index_veeam_get( + def index_vc_cpe_dictionary_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -296578,10 +296578,10 @@ def index_veeam_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination: - """Return vulnerability data stored in index \"veeam\" + ) -> RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination: + """Return vulnerability data stored in index \"vc-cpe-dictionary\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the veeam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Veeam Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/veeam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/veeam?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vc-cpe-dictionary index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck CPE Dictionary ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vc-cpe-dictionary?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vc-cpe-dictionary?cursor=` :param page: set the page number of the response :type page: int @@ -296653,7 +296653,7 @@ def index_veeam_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_veeam_get_serialize( + _param = self._index_vc_cpe_dictionary_get_serialize( page=page, limit=limit, cursor=cursor, @@ -296685,7 +296685,7 @@ def index_veeam_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination", '404': "str", '500': "str", } @@ -296701,7 +296701,7 @@ def index_veeam_get( @validate_call - def index_veeam_get_with_http_info( + def index_vc_cpe_dictionary_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -296739,10 +296739,10 @@ def index_veeam_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination]: - """Return vulnerability data stored in index \"veeam\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination]: + """Return vulnerability data stored in index \"vc-cpe-dictionary\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the veeam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Veeam Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/veeam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/veeam?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vc-cpe-dictionary index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck CPE Dictionary ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vc-cpe-dictionary?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vc-cpe-dictionary?cursor=` :param page: set the page number of the response :type page: int @@ -296814,7 +296814,7 @@ def index_veeam_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_veeam_get_serialize( + _param = self._index_vc_cpe_dictionary_get_serialize( page=page, limit=limit, cursor=cursor, @@ -296846,7 +296846,7 @@ def index_veeam_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination", '404': "str", '500': "str", } @@ -296862,7 +296862,7 @@ def index_veeam_get_with_http_info( @validate_call - def index_veeam_get_without_preload_content( + def index_vc_cpe_dictionary_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -296901,9 +296901,9 @@ def index_veeam_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"veeam\" + """Return vulnerability data stored in index \"vc-cpe-dictionary\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the veeam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Veeam Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/veeam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/veeam?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vc-cpe-dictionary index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck CPE Dictionary ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vc-cpe-dictionary?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vc-cpe-dictionary?cursor=` :param page: set the page number of the response :type page: int @@ -296975,7 +296975,7 @@ def index_veeam_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_veeam_get_serialize( + _param = self._index_vc_cpe_dictionary_get_serialize( page=page, limit=limit, cursor=cursor, @@ -297007,7 +297007,7 @@ def index_veeam_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination", '404': "str", '500': "str", } @@ -297018,7 +297018,7 @@ def index_veeam_get_without_preload_content( return response_data.response - def _index_veeam_get_serialize( + def _index_vc_cpe_dictionary_get_serialize( self, page, limit, @@ -297186,7 +297186,7 @@ def _index_veeam_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/veeam', + resource_path='/v3/index/vc-cpe-dictionary', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -297203,7 +297203,7 @@ def _index_veeam_get_serialize( @validate_call - def index_veritas_get( + def index_vde_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -297241,10 +297241,10 @@ def index_veritas_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination: - """Return vulnerability data stored in index \"veritas\" + ) -> RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"vde\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the veritas index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Veritas Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/veritas?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/veritas?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vde index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VDE CERT Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vde?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vde?cursor=` :param page: set the page number of the response :type page: int @@ -297316,7 +297316,7 @@ def index_veritas_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_veritas_get_serialize( + _param = self._index_vde_get_serialize( page=page, limit=limit, cursor=cursor, @@ -297348,7 +297348,7 @@ def index_veritas_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -297364,7 +297364,7 @@ def index_veritas_get( @validate_call - def index_veritas_get_with_http_info( + def index_vde_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -297402,10 +297402,10 @@ def index_veritas_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination]: - """Return vulnerability data stored in index \"veritas\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"vde\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the veritas index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Veritas Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/veritas?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/veritas?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vde index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VDE CERT Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vde?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vde?cursor=` :param page: set the page number of the response :type page: int @@ -297477,7 +297477,7 @@ def index_veritas_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_veritas_get_serialize( + _param = self._index_vde_get_serialize( page=page, limit=limit, cursor=cursor, @@ -297509,7 +297509,7 @@ def index_veritas_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -297525,7 +297525,7 @@ def index_veritas_get_with_http_info( @validate_call - def index_veritas_get_without_preload_content( + def index_vde_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -297564,9 +297564,9 @@ def index_veritas_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"veritas\" + """Return vulnerability data stored in index \"vde\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the veritas index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Veritas Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/veritas?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/veritas?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vde index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VDE CERT Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vde?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vde?cursor=` :param page: set the page number of the response :type page: int @@ -297638,7 +297638,7 @@ def index_veritas_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_veritas_get_serialize( + _param = self._index_vde_get_serialize( page=page, limit=limit, cursor=cursor, @@ -297670,7 +297670,7 @@ def index_veritas_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -297681,7 +297681,7 @@ def index_veritas_get_without_preload_content( return response_data.response - def _index_veritas_get_serialize( + def _index_vde_get_serialize( self, page, limit, @@ -297849,7 +297849,7 @@ def _index_veritas_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/veritas', + resource_path='/v3/index/vde', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -297866,7 +297866,7 @@ def _index_veritas_get_serialize( @validate_call - def index_virtuozzo_get( + def index_veeam_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -297904,10 +297904,10 @@ def index_virtuozzo_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination: - """Return vulnerability data stored in index \"virtuozzo\" + ) -> RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination: + """Return vulnerability data stored in index \"veeam\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the virtuozzo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Virtuozzo Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/virtuozzo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/virtuozzo?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the veeam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Veeam Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/veeam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/veeam?cursor=` :param page: set the page number of the response :type page: int @@ -297979,7 +297979,7 @@ def index_virtuozzo_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_virtuozzo_get_serialize( + _param = self._index_veeam_get_serialize( page=page, limit=limit, cursor=cursor, @@ -298011,7 +298011,7 @@ def index_virtuozzo_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination", '404': "str", '500': "str", } @@ -298027,7 +298027,7 @@ def index_virtuozzo_get( @validate_call - def index_virtuozzo_get_with_http_info( + def index_veeam_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -298065,10 +298065,10 @@ def index_virtuozzo_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination]: - """Return vulnerability data stored in index \"virtuozzo\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination]: + """Return vulnerability data stored in index \"veeam\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the virtuozzo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Virtuozzo Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/virtuozzo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/virtuozzo?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the veeam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Veeam Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/veeam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/veeam?cursor=` :param page: set the page number of the response :type page: int @@ -298140,7 +298140,7 @@ def index_virtuozzo_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_virtuozzo_get_serialize( + _param = self._index_veeam_get_serialize( page=page, limit=limit, cursor=cursor, @@ -298172,7 +298172,7 @@ def index_virtuozzo_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination", '404': "str", '500': "str", } @@ -298188,7 +298188,7 @@ def index_virtuozzo_get_with_http_info( @validate_call - def index_virtuozzo_get_without_preload_content( + def index_veeam_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -298227,9 +298227,9 @@ def index_virtuozzo_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"virtuozzo\" + """Return vulnerability data stored in index \"veeam\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the virtuozzo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Virtuozzo Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/virtuozzo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/virtuozzo?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the veeam index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Veeam Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/veeam?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/veeam?cursor=` :param page: set the page number of the response :type page: int @@ -298301,7 +298301,7 @@ def index_virtuozzo_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_virtuozzo_get_serialize( + _param = self._index_veeam_get_serialize( page=page, limit=limit, cursor=cursor, @@ -298333,7 +298333,7 @@ def index_virtuozzo_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination", '404': "str", '500': "str", } @@ -298344,7 +298344,7 @@ def index_virtuozzo_get_without_preload_content( return response_data.response - def _index_virtuozzo_get_serialize( + def _index_veeam_get_serialize( self, page, limit, @@ -298512,7 +298512,7 @@ def _index_virtuozzo_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/virtuozzo', + resource_path='/v3/index/veeam', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -298529,7 +298529,7 @@ def _index_virtuozzo_get_serialize( @validate_call - def index_vlc_get( + def index_veritas_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -298567,10 +298567,10 @@ def index_vlc_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination: - """Return vulnerability data stored in index \"vlc\" + ) -> RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination: + """Return vulnerability data stored in index \"veritas\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vlc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VLC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vlc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vlc?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the veritas index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Veritas Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/veritas?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/veritas?cursor=` :param page: set the page number of the response :type page: int @@ -298642,7 +298642,7 @@ def index_vlc_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vlc_get_serialize( + _param = self._index_veritas_get_serialize( page=page, limit=limit, cursor=cursor, @@ -298674,7 +298674,7 @@ def index_vlc_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination", '404': "str", '500': "str", } @@ -298690,7 +298690,7 @@ def index_vlc_get( @validate_call - def index_vlc_get_with_http_info( + def index_veritas_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -298728,10 +298728,10 @@ def index_vlc_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination]: - """Return vulnerability data stored in index \"vlc\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination]: + """Return vulnerability data stored in index \"veritas\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vlc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VLC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vlc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vlc?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the veritas index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Veritas Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/veritas?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/veritas?cursor=` :param page: set the page number of the response :type page: int @@ -298803,7 +298803,7 @@ def index_vlc_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vlc_get_serialize( + _param = self._index_veritas_get_serialize( page=page, limit=limit, cursor=cursor, @@ -298835,7 +298835,7 @@ def index_vlc_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination", '404': "str", '500': "str", } @@ -298851,7 +298851,7 @@ def index_vlc_get_with_http_info( @validate_call - def index_vlc_get_without_preload_content( + def index_veritas_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -298890,9 +298890,9 @@ def index_vlc_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"vlc\" + """Return vulnerability data stored in index \"veritas\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vlc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VLC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vlc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vlc?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the veritas index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Veritas Security Alerts ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/veritas?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/veritas?cursor=` :param page: set the page number of the response :type page: int @@ -298964,7 +298964,7 @@ def index_vlc_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vlc_get_serialize( + _param = self._index_veritas_get_serialize( page=page, limit=limit, cursor=cursor, @@ -298996,7 +298996,7 @@ def index_vlc_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination", '404': "str", '500': "str", } @@ -299007,7 +299007,7 @@ def index_vlc_get_without_preload_content( return response_data.response - def _index_vlc_get_serialize( + def _index_veritas_get_serialize( self, page, limit, @@ -299175,7 +299175,7 @@ def _index_vlc_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/vlc', + resource_path='/v3/index/veritas', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -299192,7 +299192,7 @@ def _index_vlc_get_serialize( @validate_call - def index_vmware_get( + def index_virtuozzo_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -299230,10 +299230,10 @@ def index_vmware_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination: - """Return vulnerability data stored in index \"vmware\" + ) -> RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination: + """Return vulnerability data stored in index \"virtuozzo\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vmware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VMWare Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vmware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vmware?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the virtuozzo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Virtuozzo Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/virtuozzo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/virtuozzo?cursor=` :param page: set the page number of the response :type page: int @@ -299305,7 +299305,7 @@ def index_vmware_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vmware_get_serialize( + _param = self._index_virtuozzo_get_serialize( page=page, limit=limit, cursor=cursor, @@ -299337,7 +299337,7 @@ def index_vmware_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination", '404': "str", '500': "str", } @@ -299353,7 +299353,7 @@ def index_vmware_get( @validate_call - def index_vmware_get_with_http_info( + def index_virtuozzo_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -299391,10 +299391,10 @@ def index_vmware_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination]: - """Return vulnerability data stored in index \"vmware\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination]: + """Return vulnerability data stored in index \"virtuozzo\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vmware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VMWare Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vmware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vmware?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the virtuozzo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Virtuozzo Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/virtuozzo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/virtuozzo?cursor=` :param page: set the page number of the response :type page: int @@ -299466,7 +299466,7 @@ def index_vmware_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vmware_get_serialize( + _param = self._index_virtuozzo_get_serialize( page=page, limit=limit, cursor=cursor, @@ -299498,7 +299498,7 @@ def index_vmware_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination", '404': "str", '500': "str", } @@ -299514,7 +299514,7 @@ def index_vmware_get_with_http_info( @validate_call - def index_vmware_get_without_preload_content( + def index_virtuozzo_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -299553,9 +299553,9 @@ def index_vmware_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"vmware\" + """Return vulnerability data stored in index \"virtuozzo\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vmware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VMWare Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vmware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vmware?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the virtuozzo index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** Virtuozzo Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/virtuozzo?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/virtuozzo?cursor=` :param page: set the page number of the response :type page: int @@ -299627,7 +299627,7 @@ def index_vmware_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vmware_get_serialize( + _param = self._index_virtuozzo_get_serialize( page=page, limit=limit, cursor=cursor, @@ -299659,7 +299659,7 @@ def index_vmware_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination", '404': "str", '500': "str", } @@ -299670,7 +299670,7 @@ def index_vmware_get_without_preload_content( return response_data.response - def _index_vmware_get_serialize( + def _index_virtuozzo_get_serialize( self, page, limit, @@ -299838,7 +299838,7 @@ def _index_vmware_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/vmware', + resource_path='/v3/index/virtuozzo', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -299855,7 +299855,7 @@ def _index_vmware_get_serialize( @validate_call - def index_voidsec_get( + def index_vlc_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -299893,10 +299893,10 @@ def index_voidsec_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination: - """Return vulnerability data stored in index \"voidsec\" + ) -> RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination: + """Return vulnerability data stored in index \"vlc\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the voidsec index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VoidSec Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/voidsec?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/voidsec?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vlc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VLC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vlc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vlc?cursor=` :param page: set the page number of the response :type page: int @@ -299968,7 +299968,7 @@ def index_voidsec_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_voidsec_get_serialize( + _param = self._index_vlc_get_serialize( page=page, limit=limit, cursor=cursor, @@ -300000,7 +300000,7 @@ def index_voidsec_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination", '404': "str", '500': "str", } @@ -300016,7 +300016,7 @@ def index_voidsec_get( @validate_call - def index_voidsec_get_with_http_info( + def index_vlc_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -300054,10 +300054,10 @@ def index_voidsec_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination]: - """Return vulnerability data stored in index \"voidsec\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination]: + """Return vulnerability data stored in index \"vlc\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the voidsec index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VoidSec Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/voidsec?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/voidsec?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vlc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VLC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vlc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vlc?cursor=` :param page: set the page number of the response :type page: int @@ -300129,7 +300129,7 @@ def index_voidsec_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_voidsec_get_serialize( + _param = self._index_vlc_get_serialize( page=page, limit=limit, cursor=cursor, @@ -300161,7 +300161,7 @@ def index_voidsec_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination", '404': "str", '500': "str", } @@ -300177,7 +300177,7 @@ def index_voidsec_get_with_http_info( @validate_call - def index_voidsec_get_without_preload_content( + def index_vlc_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -300216,9 +300216,9 @@ def index_voidsec_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"voidsec\" + """Return vulnerability data stored in index \"vlc\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the voidsec index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VoidSec Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/voidsec?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/voidsec?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vlc index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VLC Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vlc?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vlc?cursor=` :param page: set the page number of the response :type page: int @@ -300290,7 +300290,7 @@ def index_voidsec_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_voidsec_get_serialize( + _param = self._index_vlc_get_serialize( page=page, limit=limit, cursor=cursor, @@ -300322,7 +300322,7 @@ def index_voidsec_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination", '404': "str", '500': "str", } @@ -300333,7 +300333,7 @@ def index_voidsec_get_without_preload_content( return response_data.response - def _index_voidsec_get_serialize( + def _index_vlc_get_serialize( self, page, limit, @@ -300501,7 +300501,7 @@ def _index_voidsec_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/voidsec', + resource_path='/v3/index/vlc', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -300518,7 +300518,7 @@ def _index_voidsec_get_serialize( @validate_call - def index_vulncheck_canaries10d_get( + def index_vmware_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -300527,10 +300527,16 @@ def index_vulncheck_canaries10d_get( order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, + iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, + jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, + ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, + threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, + mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, + misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, + ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, + botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -300550,10 +300556,10 @@ def index_vulncheck_canaries10d_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination: - """Return vulnerability data stored in index \"vulncheck-canaries-10d\" + ) -> RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination: + """Return vulnerability data stored in index \"vmware\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-10d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (10 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-10d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-10d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vmware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VMWare Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vmware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vmware?cursor=` :param page: set the page number of the response :type page: int @@ -300569,14 +300575,26 @@ def index_vulncheck_canaries10d_get( :type sort: str :param cve: Specify a CVE ID to search with. :type cve: str + :param alias: Specify a vulnerability alias to search with. + :type alias: str + :param iava: Specify an IAVA ID to search with. + :type iava: str + :param jvndb: Specify a JVNDB ID to search with. + :type jvndb: str + :param ilvn: Specify an ILVN ID to search with. + :type ilvn: str + :param threat_actor: Specify a threat actor name to search with. + :type threat_actor: str + :param mitre_id: Specify a MITRE ID to search with. + :type mitre_id: str + :param misp_id: Specify a MISP ID to search with. + :type misp_id: str + :param ransomware: Specify a ransomeware family name to search with. + :type ransomware: str + :param botnet: Specify a botnet name to search with. + :type botnet: str :param published: Specify a published date :type published: str - :param src_country: Country code in ISO-3166 format - :type src_country: str - :param dst_country: Country code in ISO-3166 format - :type dst_country: str - :param src_ip: Source IP address - :type src_ip: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -300613,7 +300631,7 @@ def index_vulncheck_canaries10d_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_canaries10d_get_serialize( + _param = self._index_vmware_get_serialize( page=page, limit=limit, cursor=cursor, @@ -300621,10 +300639,16 @@ def index_vulncheck_canaries10d_get( order=order, sort=sort, cve=cve, + alias=alias, + iava=iava, + jvndb=jvndb, + ilvn=ilvn, + threat_actor=threat_actor, + mitre_id=mitre_id, + misp_id=misp_id, + ransomware=ransomware, + botnet=botnet, published=published, - src_country=src_country, - dst_country=dst_country, - src_ip=src_ip, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -300639,7 +300663,7 @@ def index_vulncheck_canaries10d_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -300655,7 +300679,7 @@ def index_vulncheck_canaries10d_get( @validate_call - def index_vulncheck_canaries10d_get_with_http_info( + def index_vmware_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -300664,10 +300688,16 @@ def index_vulncheck_canaries10d_get_with_http_info( order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, + iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, + jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, + ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, + threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, + mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, + misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, + ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, + botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -300687,10 +300717,10 @@ def index_vulncheck_canaries10d_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination]: - """Return vulnerability data stored in index \"vulncheck-canaries-10d\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination]: + """Return vulnerability data stored in index \"vmware\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-10d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (10 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-10d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-10d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vmware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VMWare Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vmware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vmware?cursor=` :param page: set the page number of the response :type page: int @@ -300706,14 +300736,26 @@ def index_vulncheck_canaries10d_get_with_http_info( :type sort: str :param cve: Specify a CVE ID to search with. :type cve: str + :param alias: Specify a vulnerability alias to search with. + :type alias: str + :param iava: Specify an IAVA ID to search with. + :type iava: str + :param jvndb: Specify a JVNDB ID to search with. + :type jvndb: str + :param ilvn: Specify an ILVN ID to search with. + :type ilvn: str + :param threat_actor: Specify a threat actor name to search with. + :type threat_actor: str + :param mitre_id: Specify a MITRE ID to search with. + :type mitre_id: str + :param misp_id: Specify a MISP ID to search with. + :type misp_id: str + :param ransomware: Specify a ransomeware family name to search with. + :type ransomware: str + :param botnet: Specify a botnet name to search with. + :type botnet: str :param published: Specify a published date :type published: str - :param src_country: Country code in ISO-3166 format - :type src_country: str - :param dst_country: Country code in ISO-3166 format - :type dst_country: str - :param src_ip: Source IP address - :type src_ip: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -300750,7 +300792,7 @@ def index_vulncheck_canaries10d_get_with_http_info( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_canaries10d_get_serialize( + _param = self._index_vmware_get_serialize( page=page, limit=limit, cursor=cursor, @@ -300758,10 +300800,16 @@ def index_vulncheck_canaries10d_get_with_http_info( order=order, sort=sort, cve=cve, + alias=alias, + iava=iava, + jvndb=jvndb, + ilvn=ilvn, + threat_actor=threat_actor, + mitre_id=mitre_id, + misp_id=misp_id, + ransomware=ransomware, + botnet=botnet, published=published, - src_country=src_country, - dst_country=dst_country, - src_ip=src_ip, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -300776,7 +300824,7 @@ def index_vulncheck_canaries10d_get_with_http_info( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -300792,7 +300840,7 @@ def index_vulncheck_canaries10d_get_with_http_info( @validate_call - def index_vulncheck_canaries10d_get_without_preload_content( + def index_vmware_get_without_preload_content( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -300801,10 +300849,16 @@ def index_vulncheck_canaries10d_get_without_preload_content( order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, + iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, + jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, + ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, + threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, + mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, + misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, + ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, + botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -300825,9 +300879,9 @@ def index_vulncheck_canaries10d_get_without_preload_content( _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, ) -> RESTResponseType: - """Return vulnerability data stored in index \"vulncheck-canaries-10d\" + """Return vulnerability data stored in index \"vmware\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-10d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (10 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-10d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-10d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vmware index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VMWare Security Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vmware?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vmware?cursor=` :param page: set the page number of the response :type page: int @@ -300843,14 +300897,26 @@ def index_vulncheck_canaries10d_get_without_preload_content( :type sort: str :param cve: Specify a CVE ID to search with. :type cve: str + :param alias: Specify a vulnerability alias to search with. + :type alias: str + :param iava: Specify an IAVA ID to search with. + :type iava: str + :param jvndb: Specify a JVNDB ID to search with. + :type jvndb: str + :param ilvn: Specify an ILVN ID to search with. + :type ilvn: str + :param threat_actor: Specify a threat actor name to search with. + :type threat_actor: str + :param mitre_id: Specify a MITRE ID to search with. + :type mitre_id: str + :param misp_id: Specify a MISP ID to search with. + :type misp_id: str + :param ransomware: Specify a ransomeware family name to search with. + :type ransomware: str + :param botnet: Specify a botnet name to search with. + :type botnet: str :param published: Specify a published date :type published: str - :param src_country: Country code in ISO-3166 format - :type src_country: str - :param dst_country: Country code in ISO-3166 format - :type dst_country: str - :param src_ip: Source IP address - :type src_ip: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -300887,7 +300953,7 @@ def index_vulncheck_canaries10d_get_without_preload_content( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_canaries10d_get_serialize( + _param = self._index_vmware_get_serialize( page=page, limit=limit, cursor=cursor, @@ -300895,10 +300961,16 @@ def index_vulncheck_canaries10d_get_without_preload_content( order=order, sort=sort, cve=cve, + alias=alias, + iava=iava, + jvndb=jvndb, + ilvn=ilvn, + threat_actor=threat_actor, + mitre_id=mitre_id, + misp_id=misp_id, + ransomware=ransomware, + botnet=botnet, published=published, - src_country=src_country, - dst_country=dst_country, - src_ip=src_ip, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -300913,7 +300985,7 @@ def index_vulncheck_canaries10d_get_without_preload_content( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination", '404': "str", '500': "str", } @@ -300924,7 +300996,7 @@ def index_vulncheck_canaries10d_get_without_preload_content( return response_data.response - def _index_vulncheck_canaries10d_get_serialize( + def _index_vmware_get_serialize( self, page, limit, @@ -300933,10 +301005,16 @@ def _index_vulncheck_canaries10d_get_serialize( order, sort, cve, + alias, + iava, + jvndb, + ilvn, + threat_actor, + mitre_id, + misp_id, + ransomware, + botnet, published, - src_country, - dst_country, - src_ip, date, updated_at_start_date, updated_at_end_date, @@ -300997,21 +301075,45 @@ def _index_vulncheck_canaries10d_get_serialize( _query_params.append(('cve', cve)) - if published is not None: + if alias is not None: - _query_params.append(('published', published)) + _query_params.append(('alias', alias)) - if src_country is not None: + if iava is not None: - _query_params.append(('src_country', src_country)) + _query_params.append(('iava', iava)) - if dst_country is not None: + if jvndb is not None: - _query_params.append(('dst_country', dst_country)) + _query_params.append(('jvndb', jvndb)) - if src_ip is not None: + if ilvn is not None: - _query_params.append(('src_ip', src_ip)) + _query_params.append(('ilvn', ilvn)) + + if threat_actor is not None: + + _query_params.append(('threat_actor', threat_actor)) + + if mitre_id is not None: + + _query_params.append(('mitre_id', mitre_id)) + + if misp_id is not None: + + _query_params.append(('misp_id', misp_id)) + + if ransomware is not None: + + _query_params.append(('ransomware', ransomware)) + + if botnet is not None: + + _query_params.append(('botnet', botnet)) + + if published is not None: + + _query_params.append(('published', published)) if date is not None: @@ -301062,7 +301164,7 @@ def _index_vulncheck_canaries10d_get_serialize( return self.api_client.param_serialize( method='GET', - resource_path='/v3/index/vulncheck-canaries-10d', + resource_path='/v3/index/vmware', path_params=_path_params, query_params=_query_params, header_params=_header_params, @@ -301079,7 +301181,7 @@ def _index_vulncheck_canaries10d_get_serialize( @validate_call - def index_vulncheck_canaries30d_get( + def index_voidsec_get( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -301088,10 +301190,16 @@ def index_vulncheck_canaries30d_get( order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, + iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, + jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, + ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, + threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, + mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, + misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, + ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, + botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -301111,10 +301219,10 @@ def index_vulncheck_canaries30d_get( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination: - """Return vulnerability data stored in index \"vulncheck-canaries-30d\" + ) -> RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination: + """Return vulnerability data stored in index \"voidsec\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-30d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (30 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-30d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-30d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the voidsec index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VoidSec Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/voidsec?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/voidsec?cursor=` :param page: set the page number of the response :type page: int @@ -301130,14 +301238,26 @@ def index_vulncheck_canaries30d_get( :type sort: str :param cve: Specify a CVE ID to search with. :type cve: str + :param alias: Specify a vulnerability alias to search with. + :type alias: str + :param iava: Specify an IAVA ID to search with. + :type iava: str + :param jvndb: Specify a JVNDB ID to search with. + :type jvndb: str + :param ilvn: Specify an ILVN ID to search with. + :type ilvn: str + :param threat_actor: Specify a threat actor name to search with. + :type threat_actor: str + :param mitre_id: Specify a MITRE ID to search with. + :type mitre_id: str + :param misp_id: Specify a MISP ID to search with. + :type misp_id: str + :param ransomware: Specify a ransomeware family name to search with. + :type ransomware: str + :param botnet: Specify a botnet name to search with. + :type botnet: str :param published: Specify a published date :type published: str - :param src_country: Country code in ISO-3166 format - :type src_country: str - :param dst_country: Country code in ISO-3166 format - :type dst_country: str - :param src_ip: Source IP address - :type src_ip: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -301174,7 +301294,7 @@ def index_vulncheck_canaries30d_get( :return: Returns the result object. """ # noqa: E501 - _param = self._index_vulncheck_canaries30d_get_serialize( + _param = self._index_voidsec_get_serialize( page=page, limit=limit, cursor=cursor, @@ -301182,10 +301302,16 @@ def index_vulncheck_canaries30d_get( order=order, sort=sort, cve=cve, + alias=alias, + iava=iava, + jvndb=jvndb, + ilvn=ilvn, + threat_actor=threat_actor, + mitre_id=mitre_id, + misp_id=misp_id, + ransomware=ransomware, + botnet=botnet, published=published, - src_country=src_country, - dst_country=dst_country, - src_ip=src_ip, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -301200,7 +301326,7 @@ def index_vulncheck_canaries30d_get( ) _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination", + '200': "RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination", '404': "str", '500': "str", } @@ -301216,7 +301342,7 @@ def index_vulncheck_canaries30d_get( @validate_call - def index_vulncheck_canaries30d_get_with_http_info( + def index_voidsec_get_with_http_info( self, page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, @@ -301225,10 +301351,16 @@ def index_vulncheck_canaries30d_get_with_http_info( order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, + iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, + jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, + ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, + threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, + mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, + misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, + ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, + botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -301248,10 +301380,10 @@ def index_vulncheck_canaries30d_get_with_http_info( _content_type: Optional[StrictStr] = None, _headers: Optional[Dict[StrictStr, Any]] = None, _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination]: - """Return vulnerability data stored in index \"vulncheck-canaries-30d\" + ) -> ApiResponse[RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination]: + """Return vulnerability data stored in index \"voidsec\" - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-30d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (30 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-30d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-30d?cursor=` + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the voidsec index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VoidSec Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/voidsec?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/voidsec?cursor=` :param page: set the page number of the response :type page: int @@ -301267,14 +301399,1091 @@ def index_vulncheck_canaries30d_get_with_http_info( :type sort: str :param cve: Specify a CVE ID to search with. :type cve: str + :param alias: Specify a vulnerability alias to search with. + :type alias: str + :param iava: Specify an IAVA ID to search with. + :type iava: str + :param jvndb: Specify a JVNDB ID to search with. + :type jvndb: str + :param ilvn: Specify an ILVN ID to search with. + :type ilvn: str + :param threat_actor: Specify a threat actor name to search with. + :type threat_actor: str + :param mitre_id: Specify a MITRE ID to search with. + :type mitre_id: str + :param misp_id: Specify a MISP ID to search with. + :type misp_id: str + :param ransomware: Specify a ransomeware family name to search with. + :type ransomware: str + :param botnet: Specify a botnet name to search with. + :type botnet: str :param published: Specify a published date :type published: str - :param src_country: Country code in ISO-3166 format - :type src_country: str - :param dst_country: Country code in ISO-3166 format - :type dst_country: str - :param src_ip: Source IP address - :type src_ip: str + :param date: Specify an exact published date to filter with. + :type date: str + :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. + :type updated_at_start_date: str + :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. + :type updated_at_end_date: str + :param last_mod_start_date: Specify a starting last modified date to filter with. + :type last_mod_start_date: str + :param last_mod_end_date: Specify an ending last modified date to filter with. + :type last_mod_end_date: str + :param pub_start_date: Specify a starting published date to filter with. + :type pub_start_date: str + :param pub_end_date: Specify an ending published date to filter with. + :type pub_end_date: str + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._index_voidsec_get_serialize( + page=page, + limit=limit, + cursor=cursor, + start_cursor=start_cursor, + order=order, + sort=sort, + cve=cve, + alias=alias, + iava=iava, + jvndb=jvndb, + ilvn=ilvn, + threat_actor=threat_actor, + mitre_id=mitre_id, + misp_id=misp_id, + ransomware=ransomware, + botnet=botnet, + published=published, + date=date, + updated_at_start_date=updated_at_start_date, + updated_at_end_date=updated_at_end_date, + last_mod_start_date=last_mod_start_date, + last_mod_end_date=last_mod_end_date, + pub_start_date=pub_start_date, + pub_end_date=pub_end_date, + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination", + '404': "str", + '500': "str", + } + response_data = self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + response_data.read() + return self.api_client.response_deserialize( + response_data=response_data, + response_types_map=_response_types_map, + ) + + + @validate_call + def index_voidsec_get_without_preload_content( + self, + page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, + limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, + cursor: Annotated[Optional[StrictStr], Field(description="continue server-side paging using a cursor id")] = None, + start_cursor: Annotated[Optional[StrictStr], Field(description="request server-side paging")] = None, + order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, + sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, + cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + alias: Annotated[Optional[StrictStr], Field(description="Specify a vulnerability alias to search with.")] = None, + iava: Annotated[Optional[StrictStr], Field(description="Specify an IAVA ID to search with.")] = None, + jvndb: Annotated[Optional[StrictStr], Field(description="Specify a JVNDB ID to search with.")] = None, + ilvn: Annotated[Optional[StrictStr], Field(description="Specify an ILVN ID to search with.")] = None, + threat_actor: Annotated[Optional[StrictStr], Field(description="Specify a threat actor name to search with.")] = None, + mitre_id: Annotated[Optional[StrictStr], Field(description="Specify a MITRE ID to search with.")] = None, + misp_id: Annotated[Optional[StrictStr], Field(description="Specify a MISP ID to search with.")] = None, + ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, + botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, + published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, + updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, + updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, + last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, + last_mod_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending last modified date to filter with.")] = None, + pub_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, + pub_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, + ) -> RESTResponseType: + """Return vulnerability data stored in index \"voidsec\" + + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the voidsec index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VoidSec Advisories ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/voidsec?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/voidsec?cursor=` + + :param page: set the page number of the response + :type page: int + :param limit: limit the number of findings in the response + :type limit: int + :param cursor: continue server-side paging using a cursor id + :type cursor: str + :param start_cursor: request server-side paging + :type start_cursor: str + :param order: direction of the sort + :type order: str + :param sort: field by which to sort the results + :type sort: str + :param cve: Specify a CVE ID to search with. + :type cve: str + :param alias: Specify a vulnerability alias to search with. + :type alias: str + :param iava: Specify an IAVA ID to search with. + :type iava: str + :param jvndb: Specify a JVNDB ID to search with. + :type jvndb: str + :param ilvn: Specify an ILVN ID to search with. + :type ilvn: str + :param threat_actor: Specify a threat actor name to search with. + :type threat_actor: str + :param mitre_id: Specify a MITRE ID to search with. + :type mitre_id: str + :param misp_id: Specify a MISP ID to search with. + :type misp_id: str + :param ransomware: Specify a ransomeware family name to search with. + :type ransomware: str + :param botnet: Specify a botnet name to search with. + :type botnet: str + :param published: Specify a published date + :type published: str + :param date: Specify an exact published date to filter with. + :type date: str + :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. + :type updated_at_start_date: str + :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. + :type updated_at_end_date: str + :param last_mod_start_date: Specify a starting last modified date to filter with. + :type last_mod_start_date: str + :param last_mod_end_date: Specify an ending last modified date to filter with. + :type last_mod_end_date: str + :param pub_start_date: Specify a starting published date to filter with. + :type pub_start_date: str + :param pub_end_date: Specify an ending published date to filter with. + :type pub_end_date: str + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._index_voidsec_get_serialize( + page=page, + limit=limit, + cursor=cursor, + start_cursor=start_cursor, + order=order, + sort=sort, + cve=cve, + alias=alias, + iava=iava, + jvndb=jvndb, + ilvn=ilvn, + threat_actor=threat_actor, + mitre_id=mitre_id, + misp_id=misp_id, + ransomware=ransomware, + botnet=botnet, + published=published, + date=date, + updated_at_start_date=updated_at_start_date, + updated_at_end_date=updated_at_end_date, + last_mod_start_date=last_mod_start_date, + last_mod_end_date=last_mod_end_date, + pub_start_date=pub_start_date, + pub_end_date=pub_end_date, + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination", + '404': "str", + '500': "str", + } + response_data = self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + return response_data.response + + + def _index_voidsec_get_serialize( + self, + page, + limit, + cursor, + start_cursor, + order, + sort, + cve, + alias, + iava, + jvndb, + ilvn, + threat_actor, + mitre_id, + misp_id, + ransomware, + botnet, + published, + date, + updated_at_start_date, + updated_at_end_date, + last_mod_start_date, + last_mod_end_date, + pub_start_date, + pub_end_date, + _request_auth, + _content_type, + _headers, + _host_index, + ) -> RequestSerialized: + + _hosts = [ + 'https://api.vulncheck.com' + ] + _host = _hosts[_host_index] + + _collection_formats: Dict[str, str] = { + } + + _path_params: Dict[str, str] = {} + _query_params: List[Tuple[str, str]] = [] + _header_params: Dict[str, Optional[str]] = _headers or {} + _form_params: List[Tuple[str, str]] = [] + _files: Dict[ + str, Union[str, bytes, List[str], List[bytes], List[Tuple[str, bytes]]] + ] = {} + _body_params: Optional[bytes] = None + + # process the path parameters + # process the query parameters + if page is not None: + + _query_params.append(('page', page)) + + if limit is not None: + + _query_params.append(('limit', limit)) + + if cursor is not None: + + _query_params.append(('cursor', cursor)) + + if start_cursor is not None: + + _query_params.append(('start_cursor', start_cursor)) + + if order is not None: + + _query_params.append(('order', order)) + + if sort is not None: + + _query_params.append(('sort', sort)) + + if cve is not None: + + _query_params.append(('cve', cve)) + + if alias is not None: + + _query_params.append(('alias', alias)) + + if iava is not None: + + _query_params.append(('iava', iava)) + + if jvndb is not None: + + _query_params.append(('jvndb', jvndb)) + + if ilvn is not None: + + _query_params.append(('ilvn', ilvn)) + + if threat_actor is not None: + + _query_params.append(('threat_actor', threat_actor)) + + if mitre_id is not None: + + _query_params.append(('mitre_id', mitre_id)) + + if misp_id is not None: + + _query_params.append(('misp_id', misp_id)) + + if ransomware is not None: + + _query_params.append(('ransomware', ransomware)) + + if botnet is not None: + + _query_params.append(('botnet', botnet)) + + if published is not None: + + _query_params.append(('published', published)) + + if date is not None: + + _query_params.append(('date', date)) + + if updated_at_start_date is not None: + + _query_params.append(('updatedAtStartDate', updated_at_start_date)) + + if updated_at_end_date is not None: + + _query_params.append(('updatedAtEndDate', updated_at_end_date)) + + if last_mod_start_date is not None: + + _query_params.append(('lastModStartDate', last_mod_start_date)) + + if last_mod_end_date is not None: + + _query_params.append(('lastModEndDate', last_mod_end_date)) + + if pub_start_date is not None: + + _query_params.append(('pubStartDate', pub_start_date)) + + if pub_end_date is not None: + + _query_params.append(('pubEndDate', pub_end_date)) + + # process the header parameters + # process the form parameters + # process the body parameter + + + # set the HTTP header `Accept` + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( + [ + 'application/json' + ] + ) + + + # authentication setting + _auth_settings: List[str] = [ + 'Bearer' + ] + + return self.api_client.param_serialize( + method='GET', + resource_path='/v3/index/voidsec', + path_params=_path_params, + query_params=_query_params, + header_params=_header_params, + body=_body_params, + post_params=_form_params, + files=_files, + auth_settings=_auth_settings, + collection_formats=_collection_formats, + _host=_host, + _request_auth=_request_auth + ) + + + + + @validate_call + def index_vulncheck_canaries10d_get( + self, + page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, + limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, + cursor: Annotated[Optional[StrictStr], Field(description="continue server-side paging using a cursor id")] = None, + start_cursor: Annotated[Optional[StrictStr], Field(description="request server-side paging")] = None, + order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, + sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, + cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, + src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, + dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + src_asn: Annotated[Optional[StrictStr], Field(description="Source ASN in format AS12345")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, + updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, + updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, + last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, + last_mod_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending last modified date to filter with.")] = None, + pub_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, + pub_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, + ) -> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination: + """Return vulnerability data stored in index \"vulncheck-canaries-10d\" + + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-10d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (10 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-10d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-10d?cursor=` + + :param page: set the page number of the response + :type page: int + :param limit: limit the number of findings in the response + :type limit: int + :param cursor: continue server-side paging using a cursor id + :type cursor: str + :param start_cursor: request server-side paging + :type start_cursor: str + :param order: direction of the sort + :type order: str + :param sort: field by which to sort the results + :type sort: str + :param cve: Specify a CVE ID to search with. + :type cve: str + :param published: Specify a published date + :type published: str + :param src_country: Country code in ISO-3166 format + :type src_country: str + :param dst_country: Country code in ISO-3166 format + :type dst_country: str + :param src_ip: Source IP address + :type src_ip: str + :param src_asn: Source ASN in format AS12345 + :type src_asn: str + :param date: Specify an exact published date to filter with. + :type date: str + :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. + :type updated_at_start_date: str + :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. + :type updated_at_end_date: str + :param last_mod_start_date: Specify a starting last modified date to filter with. + :type last_mod_start_date: str + :param last_mod_end_date: Specify an ending last modified date to filter with. + :type last_mod_end_date: str + :param pub_start_date: Specify a starting published date to filter with. + :type pub_start_date: str + :param pub_end_date: Specify an ending published date to filter with. + :type pub_end_date: str + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._index_vulncheck_canaries10d_get_serialize( + page=page, + limit=limit, + cursor=cursor, + start_cursor=start_cursor, + order=order, + sort=sort, + cve=cve, + published=published, + src_country=src_country, + dst_country=dst_country, + src_ip=src_ip, + src_asn=src_asn, + date=date, + updated_at_start_date=updated_at_start_date, + updated_at_end_date=updated_at_end_date, + last_mod_start_date=last_mod_start_date, + last_mod_end_date=last_mod_end_date, + pub_start_date=pub_start_date, + pub_end_date=pub_end_date, + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination", + '404': "str", + '500': "str", + } + response_data = self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + response_data.read() + return self.api_client.response_deserialize( + response_data=response_data, + response_types_map=_response_types_map, + ).data + + + @validate_call + def index_vulncheck_canaries10d_get_with_http_info( + self, + page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, + limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, + cursor: Annotated[Optional[StrictStr], Field(description="continue server-side paging using a cursor id")] = None, + start_cursor: Annotated[Optional[StrictStr], Field(description="request server-side paging")] = None, + order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, + sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, + cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, + src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, + dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + src_asn: Annotated[Optional[StrictStr], Field(description="Source ASN in format AS12345")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, + updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, + updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, + last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, + last_mod_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending last modified date to filter with.")] = None, + pub_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, + pub_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, + ) -> ApiResponse[RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination]: + """Return vulnerability data stored in index \"vulncheck-canaries-10d\" + + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-10d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (10 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-10d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-10d?cursor=` + + :param page: set the page number of the response + :type page: int + :param limit: limit the number of findings in the response + :type limit: int + :param cursor: continue server-side paging using a cursor id + :type cursor: str + :param start_cursor: request server-side paging + :type start_cursor: str + :param order: direction of the sort + :type order: str + :param sort: field by which to sort the results + :type sort: str + :param cve: Specify a CVE ID to search with. + :type cve: str + :param published: Specify a published date + :type published: str + :param src_country: Country code in ISO-3166 format + :type src_country: str + :param dst_country: Country code in ISO-3166 format + :type dst_country: str + :param src_ip: Source IP address + :type src_ip: str + :param src_asn: Source ASN in format AS12345 + :type src_asn: str + :param date: Specify an exact published date to filter with. + :type date: str + :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. + :type updated_at_start_date: str + :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. + :type updated_at_end_date: str + :param last_mod_start_date: Specify a starting last modified date to filter with. + :type last_mod_start_date: str + :param last_mod_end_date: Specify an ending last modified date to filter with. + :type last_mod_end_date: str + :param pub_start_date: Specify a starting published date to filter with. + :type pub_start_date: str + :param pub_end_date: Specify an ending published date to filter with. + :type pub_end_date: str + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._index_vulncheck_canaries10d_get_serialize( + page=page, + limit=limit, + cursor=cursor, + start_cursor=start_cursor, + order=order, + sort=sort, + cve=cve, + published=published, + src_country=src_country, + dst_country=dst_country, + src_ip=src_ip, + src_asn=src_asn, + date=date, + updated_at_start_date=updated_at_start_date, + updated_at_end_date=updated_at_end_date, + last_mod_start_date=last_mod_start_date, + last_mod_end_date=last_mod_end_date, + pub_start_date=pub_start_date, + pub_end_date=pub_end_date, + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination", + '404': "str", + '500': "str", + } + response_data = self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + response_data.read() + return self.api_client.response_deserialize( + response_data=response_data, + response_types_map=_response_types_map, + ) + + + @validate_call + def index_vulncheck_canaries10d_get_without_preload_content( + self, + page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, + limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, + cursor: Annotated[Optional[StrictStr], Field(description="continue server-side paging using a cursor id")] = None, + start_cursor: Annotated[Optional[StrictStr], Field(description="request server-side paging")] = None, + order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, + sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, + cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, + src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, + dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + src_asn: Annotated[Optional[StrictStr], Field(description="Source ASN in format AS12345")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, + updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, + updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, + last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, + last_mod_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending last modified date to filter with.")] = None, + pub_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, + pub_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, + ) -> RESTResponseType: + """Return vulnerability data stored in index \"vulncheck-canaries-10d\" + + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-10d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (10 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-10d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-10d?cursor=` + + :param page: set the page number of the response + :type page: int + :param limit: limit the number of findings in the response + :type limit: int + :param cursor: continue server-side paging using a cursor id + :type cursor: str + :param start_cursor: request server-side paging + :type start_cursor: str + :param order: direction of the sort + :type order: str + :param sort: field by which to sort the results + :type sort: str + :param cve: Specify a CVE ID to search with. + :type cve: str + :param published: Specify a published date + :type published: str + :param src_country: Country code in ISO-3166 format + :type src_country: str + :param dst_country: Country code in ISO-3166 format + :type dst_country: str + :param src_ip: Source IP address + :type src_ip: str + :param src_asn: Source ASN in format AS12345 + :type src_asn: str + :param date: Specify an exact published date to filter with. + :type date: str + :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. + :type updated_at_start_date: str + :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. + :type updated_at_end_date: str + :param last_mod_start_date: Specify a starting last modified date to filter with. + :type last_mod_start_date: str + :param last_mod_end_date: Specify an ending last modified date to filter with. + :type last_mod_end_date: str + :param pub_start_date: Specify a starting published date to filter with. + :type pub_start_date: str + :param pub_end_date: Specify an ending published date to filter with. + :type pub_end_date: str + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._index_vulncheck_canaries10d_get_serialize( + page=page, + limit=limit, + cursor=cursor, + start_cursor=start_cursor, + order=order, + sort=sort, + cve=cve, + published=published, + src_country=src_country, + dst_country=dst_country, + src_ip=src_ip, + src_asn=src_asn, + date=date, + updated_at_start_date=updated_at_start_date, + updated_at_end_date=updated_at_end_date, + last_mod_start_date=last_mod_start_date, + last_mod_end_date=last_mod_end_date, + pub_start_date=pub_start_date, + pub_end_date=pub_end_date, + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination", + '404': "str", + '500': "str", + } + response_data = self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + return response_data.response + + + def _index_vulncheck_canaries10d_get_serialize( + self, + page, + limit, + cursor, + start_cursor, + order, + sort, + cve, + published, + src_country, + dst_country, + src_ip, + src_asn, + date, + updated_at_start_date, + updated_at_end_date, + last_mod_start_date, + last_mod_end_date, + pub_start_date, + pub_end_date, + _request_auth, + _content_type, + _headers, + _host_index, + ) -> RequestSerialized: + + _hosts = [ + 'https://api.vulncheck.com' + ] + _host = _hosts[_host_index] + + _collection_formats: Dict[str, str] = { + } + + _path_params: Dict[str, str] = {} + _query_params: List[Tuple[str, str]] = [] + _header_params: Dict[str, Optional[str]] = _headers or {} + _form_params: List[Tuple[str, str]] = [] + _files: Dict[ + str, Union[str, bytes, List[str], List[bytes], List[Tuple[str, bytes]]] + ] = {} + _body_params: Optional[bytes] = None + + # process the path parameters + # process the query parameters + if page is not None: + + _query_params.append(('page', page)) + + if limit is not None: + + _query_params.append(('limit', limit)) + + if cursor is not None: + + _query_params.append(('cursor', cursor)) + + if start_cursor is not None: + + _query_params.append(('start_cursor', start_cursor)) + + if order is not None: + + _query_params.append(('order', order)) + + if sort is not None: + + _query_params.append(('sort', sort)) + + if cve is not None: + + _query_params.append(('cve', cve)) + + if published is not None: + + _query_params.append(('published', published)) + + if src_country is not None: + + _query_params.append(('src_country', src_country)) + + if dst_country is not None: + + _query_params.append(('dst_country', dst_country)) + + if src_ip is not None: + + _query_params.append(('src_ip', src_ip)) + + if src_asn is not None: + + _query_params.append(('src_asn', src_asn)) + + if date is not None: + + _query_params.append(('date', date)) + + if updated_at_start_date is not None: + + _query_params.append(('updatedAtStartDate', updated_at_start_date)) + + if updated_at_end_date is not None: + + _query_params.append(('updatedAtEndDate', updated_at_end_date)) + + if last_mod_start_date is not None: + + _query_params.append(('lastModStartDate', last_mod_start_date)) + + if last_mod_end_date is not None: + + _query_params.append(('lastModEndDate', last_mod_end_date)) + + if pub_start_date is not None: + + _query_params.append(('pubStartDate', pub_start_date)) + + if pub_end_date is not None: + + _query_params.append(('pubEndDate', pub_end_date)) + + # process the header parameters + # process the form parameters + # process the body parameter + + + # set the HTTP header `Accept` + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( + [ + 'application/json' + ] + ) + + + # authentication setting + _auth_settings: List[str] = [ + 'Bearer' + ] + + return self.api_client.param_serialize( + method='GET', + resource_path='/v3/index/vulncheck-canaries-10d', + path_params=_path_params, + query_params=_query_params, + header_params=_header_params, + body=_body_params, + post_params=_form_params, + files=_files, + auth_settings=_auth_settings, + collection_formats=_collection_formats, + _host=_host, + _request_auth=_request_auth + ) + + + + + @validate_call + def index_vulncheck_canaries30d_get( + self, + page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, + limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, + cursor: Annotated[Optional[StrictStr], Field(description="continue server-side paging using a cursor id")] = None, + start_cursor: Annotated[Optional[StrictStr], Field(description="request server-side paging")] = None, + order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, + sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, + cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, + src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, + dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + src_asn: Annotated[Optional[StrictStr], Field(description="Source ASN in format AS12345")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, + updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, + updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, + last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, + last_mod_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending last modified date to filter with.")] = None, + pub_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, + pub_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, + ) -> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination: + """Return vulnerability data stored in index \"vulncheck-canaries-30d\" + + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-30d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (30 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-30d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-30d?cursor=` + + :param page: set the page number of the response + :type page: int + :param limit: limit the number of findings in the response + :type limit: int + :param cursor: continue server-side paging using a cursor id + :type cursor: str + :param start_cursor: request server-side paging + :type start_cursor: str + :param order: direction of the sort + :type order: str + :param sort: field by which to sort the results + :type sort: str + :param cve: Specify a CVE ID to search with. + :type cve: str + :param published: Specify a published date + :type published: str + :param src_country: Country code in ISO-3166 format + :type src_country: str + :param dst_country: Country code in ISO-3166 format + :type dst_country: str + :param src_ip: Source IP address + :type src_ip: str + :param src_asn: Source ASN in format AS12345 + :type src_asn: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -301323,6 +302532,148 @@ def index_vulncheck_canaries30d_get_with_http_info( src_country=src_country, dst_country=dst_country, src_ip=src_ip, + src_asn=src_asn, + date=date, + updated_at_start_date=updated_at_start_date, + updated_at_end_date=updated_at_end_date, + last_mod_start_date=last_mod_start_date, + last_mod_end_date=last_mod_end_date, + pub_start_date=pub_start_date, + pub_end_date=pub_end_date, + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination", + '404': "str", + '500': "str", + } + response_data = self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + response_data.read() + return self.api_client.response_deserialize( + response_data=response_data, + response_types_map=_response_types_map, + ).data + + + @validate_call + def index_vulncheck_canaries30d_get_with_http_info( + self, + page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, + limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, + cursor: Annotated[Optional[StrictStr], Field(description="continue server-side paging using a cursor id")] = None, + start_cursor: Annotated[Optional[StrictStr], Field(description="request server-side paging")] = None, + order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, + sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, + cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, + src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, + dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + src_asn: Annotated[Optional[StrictStr], Field(description="Source ASN in format AS12345")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, + updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, + updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, + last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, + last_mod_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending last modified date to filter with.")] = None, + pub_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, + pub_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, + ) -> ApiResponse[RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination]: + """Return vulnerability data stored in index \"vulncheck-canaries-30d\" + + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-30d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (30 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-30d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-30d?cursor=` + + :param page: set the page number of the response + :type page: int + :param limit: limit the number of findings in the response + :type limit: int + :param cursor: continue server-side paging using a cursor id + :type cursor: str + :param start_cursor: request server-side paging + :type start_cursor: str + :param order: direction of the sort + :type order: str + :param sort: field by which to sort the results + :type sort: str + :param cve: Specify a CVE ID to search with. + :type cve: str + :param published: Specify a published date + :type published: str + :param src_country: Country code in ISO-3166 format + :type src_country: str + :param dst_country: Country code in ISO-3166 format + :type dst_country: str + :param src_ip: Source IP address + :type src_ip: str + :param src_asn: Source ASN in format AS12345 + :type src_asn: str + :param date: Specify an exact published date to filter with. + :type date: str + :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. + :type updated_at_start_date: str + :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. + :type updated_at_end_date: str + :param last_mod_start_date: Specify a starting last modified date to filter with. + :type last_mod_start_date: str + :param last_mod_end_date: Specify an ending last modified date to filter with. + :type last_mod_end_date: str + :param pub_start_date: Specify a starting published date to filter with. + :type pub_start_date: str + :param pub_end_date: Specify an ending published date to filter with. + :type pub_end_date: str + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._index_vulncheck_canaries30d_get_serialize( + page=page, + limit=limit, + cursor=cursor, + start_cursor=start_cursor, + order=order, + sort=sort, + cve=cve, + published=published, + src_country=src_country, + dst_country=dst_country, + src_ip=src_ip, + src_asn=src_asn, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -301366,6 +302717,7 @@ def index_vulncheck_canaries30d_get_without_preload_content( src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + src_asn: Annotated[Optional[StrictStr], Field(description="Source ASN in format AS12345")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -301412,6 +302764,8 @@ def index_vulncheck_canaries30d_get_without_preload_content( :type dst_country: str :param src_ip: Source IP address :type src_ip: str + :param src_asn: Source ASN in format AS12345 + :type src_asn: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -301460,6 +302814,7 @@ def index_vulncheck_canaries30d_get_without_preload_content( src_country=src_country, dst_country=dst_country, src_ip=src_ip, + src_asn=src_asn, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -301498,6 +302853,585 @@ def _index_vulncheck_canaries30d_get_serialize( src_country, dst_country, src_ip, + src_asn, + date, + updated_at_start_date, + updated_at_end_date, + last_mod_start_date, + last_mod_end_date, + pub_start_date, + pub_end_date, + _request_auth, + _content_type, + _headers, + _host_index, + ) -> RequestSerialized: + + _hosts = [ + 'https://api.vulncheck.com' + ] + _host = _hosts[_host_index] + + _collection_formats: Dict[str, str] = { + } + + _path_params: Dict[str, str] = {} + _query_params: List[Tuple[str, str]] = [] + _header_params: Dict[str, Optional[str]] = _headers or {} + _form_params: List[Tuple[str, str]] = [] + _files: Dict[ + str, Union[str, bytes, List[str], List[bytes], List[Tuple[str, bytes]]] + ] = {} + _body_params: Optional[bytes] = None + + # process the path parameters + # process the query parameters + if page is not None: + + _query_params.append(('page', page)) + + if limit is not None: + + _query_params.append(('limit', limit)) + + if cursor is not None: + + _query_params.append(('cursor', cursor)) + + if start_cursor is not None: + + _query_params.append(('start_cursor', start_cursor)) + + if order is not None: + + _query_params.append(('order', order)) + + if sort is not None: + + _query_params.append(('sort', sort)) + + if cve is not None: + + _query_params.append(('cve', cve)) + + if published is not None: + + _query_params.append(('published', published)) + + if src_country is not None: + + _query_params.append(('src_country', src_country)) + + if dst_country is not None: + + _query_params.append(('dst_country', dst_country)) + + if src_ip is not None: + + _query_params.append(('src_ip', src_ip)) + + if src_asn is not None: + + _query_params.append(('src_asn', src_asn)) + + if date is not None: + + _query_params.append(('date', date)) + + if updated_at_start_date is not None: + + _query_params.append(('updatedAtStartDate', updated_at_start_date)) + + if updated_at_end_date is not None: + + _query_params.append(('updatedAtEndDate', updated_at_end_date)) + + if last_mod_start_date is not None: + + _query_params.append(('lastModStartDate', last_mod_start_date)) + + if last_mod_end_date is not None: + + _query_params.append(('lastModEndDate', last_mod_end_date)) + + if pub_start_date is not None: + + _query_params.append(('pubStartDate', pub_start_date)) + + if pub_end_date is not None: + + _query_params.append(('pubEndDate', pub_end_date)) + + # process the header parameters + # process the form parameters + # process the body parameter + + + # set the HTTP header `Accept` + if 'Accept' not in _header_params: + _header_params['Accept'] = self.api_client.select_header_accept( + [ + 'application/json' + ] + ) + + + # authentication setting + _auth_settings: List[str] = [ + 'Bearer' + ] + + return self.api_client.param_serialize( + method='GET', + resource_path='/v3/index/vulncheck-canaries-30d', + path_params=_path_params, + query_params=_query_params, + header_params=_header_params, + body=_body_params, + post_params=_form_params, + files=_files, + auth_settings=_auth_settings, + collection_formats=_collection_formats, + _host=_host, + _request_auth=_request_auth + ) + + + + + @validate_call + def index_vulncheck_canaries3d_get( + self, + page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, + limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, + cursor: Annotated[Optional[StrictStr], Field(description="continue server-side paging using a cursor id")] = None, + start_cursor: Annotated[Optional[StrictStr], Field(description="request server-side paging")] = None, + order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, + sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, + cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, + src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, + dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + src_asn: Annotated[Optional[StrictStr], Field(description="Source ASN in format AS12345")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, + updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, + updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, + last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, + last_mod_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending last modified date to filter with.")] = None, + pub_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, + pub_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, + ) -> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination: + """Return vulnerability data stored in index \"vulncheck-canaries-3d\" + + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-3d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (3 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-3d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-3d?cursor=` + + :param page: set the page number of the response + :type page: int + :param limit: limit the number of findings in the response + :type limit: int + :param cursor: continue server-side paging using a cursor id + :type cursor: str + :param start_cursor: request server-side paging + :type start_cursor: str + :param order: direction of the sort + :type order: str + :param sort: field by which to sort the results + :type sort: str + :param cve: Specify a CVE ID to search with. + :type cve: str + :param published: Specify a published date + :type published: str + :param src_country: Country code in ISO-3166 format + :type src_country: str + :param dst_country: Country code in ISO-3166 format + :type dst_country: str + :param src_ip: Source IP address + :type src_ip: str + :param src_asn: Source ASN in format AS12345 + :type src_asn: str + :param date: Specify an exact published date to filter with. + :type date: str + :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. + :type updated_at_start_date: str + :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. + :type updated_at_end_date: str + :param last_mod_start_date: Specify a starting last modified date to filter with. + :type last_mod_start_date: str + :param last_mod_end_date: Specify an ending last modified date to filter with. + :type last_mod_end_date: str + :param pub_start_date: Specify a starting published date to filter with. + :type pub_start_date: str + :param pub_end_date: Specify an ending published date to filter with. + :type pub_end_date: str + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._index_vulncheck_canaries3d_get_serialize( + page=page, + limit=limit, + cursor=cursor, + start_cursor=start_cursor, + order=order, + sort=sort, + cve=cve, + published=published, + src_country=src_country, + dst_country=dst_country, + src_ip=src_ip, + src_asn=src_asn, + date=date, + updated_at_start_date=updated_at_start_date, + updated_at_end_date=updated_at_end_date, + last_mod_start_date=last_mod_start_date, + last_mod_end_date=last_mod_end_date, + pub_start_date=pub_start_date, + pub_end_date=pub_end_date, + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination", + '404': "str", + '500': "str", + } + response_data = self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + response_data.read() + return self.api_client.response_deserialize( + response_data=response_data, + response_types_map=_response_types_map, + ).data + + + @validate_call + def index_vulncheck_canaries3d_get_with_http_info( + self, + page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, + limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, + cursor: Annotated[Optional[StrictStr], Field(description="continue server-side paging using a cursor id")] = None, + start_cursor: Annotated[Optional[StrictStr], Field(description="request server-side paging")] = None, + order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, + sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, + cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, + src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, + dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + src_asn: Annotated[Optional[StrictStr], Field(description="Source ASN in format AS12345")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, + updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, + updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, + last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, + last_mod_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending last modified date to filter with.")] = None, + pub_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, + pub_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, + ) -> ApiResponse[RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination]: + """Return vulnerability data stored in index \"vulncheck-canaries-3d\" + + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-3d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (3 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-3d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-3d?cursor=` + + :param page: set the page number of the response + :type page: int + :param limit: limit the number of findings in the response + :type limit: int + :param cursor: continue server-side paging using a cursor id + :type cursor: str + :param start_cursor: request server-side paging + :type start_cursor: str + :param order: direction of the sort + :type order: str + :param sort: field by which to sort the results + :type sort: str + :param cve: Specify a CVE ID to search with. + :type cve: str + :param published: Specify a published date + :type published: str + :param src_country: Country code in ISO-3166 format + :type src_country: str + :param dst_country: Country code in ISO-3166 format + :type dst_country: str + :param src_ip: Source IP address + :type src_ip: str + :param src_asn: Source ASN in format AS12345 + :type src_asn: str + :param date: Specify an exact published date to filter with. + :type date: str + :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. + :type updated_at_start_date: str + :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. + :type updated_at_end_date: str + :param last_mod_start_date: Specify a starting last modified date to filter with. + :type last_mod_start_date: str + :param last_mod_end_date: Specify an ending last modified date to filter with. + :type last_mod_end_date: str + :param pub_start_date: Specify a starting published date to filter with. + :type pub_start_date: str + :param pub_end_date: Specify an ending published date to filter with. + :type pub_end_date: str + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._index_vulncheck_canaries3d_get_serialize( + page=page, + limit=limit, + cursor=cursor, + start_cursor=start_cursor, + order=order, + sort=sort, + cve=cve, + published=published, + src_country=src_country, + dst_country=dst_country, + src_ip=src_ip, + src_asn=src_asn, + date=date, + updated_at_start_date=updated_at_start_date, + updated_at_end_date=updated_at_end_date, + last_mod_start_date=last_mod_start_date, + last_mod_end_date=last_mod_end_date, + pub_start_date=pub_start_date, + pub_end_date=pub_end_date, + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination", + '404': "str", + '500': "str", + } + response_data = self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + response_data.read() + return self.api_client.response_deserialize( + response_data=response_data, + response_types_map=_response_types_map, + ) + + + @validate_call + def index_vulncheck_canaries3d_get_without_preload_content( + self, + page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, + limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, + cursor: Annotated[Optional[StrictStr], Field(description="continue server-side paging using a cursor id")] = None, + start_cursor: Annotated[Optional[StrictStr], Field(description="request server-side paging")] = None, + order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, + sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, + cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, + published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, + src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, + dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + src_asn: Annotated[Optional[StrictStr], Field(description="Source ASN in format AS12345")] = None, + date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, + updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, + updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, + last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, + last_mod_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending last modified date to filter with.")] = None, + pub_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, + pub_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + _request_timeout: Union[ + None, + Annotated[StrictFloat, Field(gt=0)], + Tuple[ + Annotated[StrictFloat, Field(gt=0)], + Annotated[StrictFloat, Field(gt=0)] + ] + ] = None, + _request_auth: Optional[Dict[StrictStr, Any]] = None, + _content_type: Optional[StrictStr] = None, + _headers: Optional[Dict[StrictStr, Any]] = None, + _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, + ) -> RESTResponseType: + """Return vulnerability data stored in index \"vulncheck-canaries-3d\" + + ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-3d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (3 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-3d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-3d?cursor=` + + :param page: set the page number of the response + :type page: int + :param limit: limit the number of findings in the response + :type limit: int + :param cursor: continue server-side paging using a cursor id + :type cursor: str + :param start_cursor: request server-side paging + :type start_cursor: str + :param order: direction of the sort + :type order: str + :param sort: field by which to sort the results + :type sort: str + :param cve: Specify a CVE ID to search with. + :type cve: str + :param published: Specify a published date + :type published: str + :param src_country: Country code in ISO-3166 format + :type src_country: str + :param dst_country: Country code in ISO-3166 format + :type dst_country: str + :param src_ip: Source IP address + :type src_ip: str + :param src_asn: Source ASN in format AS12345 + :type src_asn: str + :param date: Specify an exact published date to filter with. + :type date: str + :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. + :type updated_at_start_date: str + :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. + :type updated_at_end_date: str + :param last_mod_start_date: Specify a starting last modified date to filter with. + :type last_mod_start_date: str + :param last_mod_end_date: Specify an ending last modified date to filter with. + :type last_mod_end_date: str + :param pub_start_date: Specify a starting published date to filter with. + :type pub_start_date: str + :param pub_end_date: Specify an ending published date to filter with. + :type pub_end_date: str + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :type _request_timeout: int, tuple(int, int), optional + :param _request_auth: set to override the auth_settings for an a single + request; this effectively ignores the + authentication in the spec for a single request. + :type _request_auth: dict, optional + :param _content_type: force content-type for the request. + :type _content_type: str, Optional + :param _headers: set to override the headers for a single + request; this effectively ignores the headers + in the spec for a single request. + :type _headers: dict, optional + :param _host_index: set to override the host_index for a single + request; this effectively ignores the host_index + in the spec for a single request. + :type _host_index: int, optional + :return: Returns the result object. + """ # noqa: E501 + + _param = self._index_vulncheck_canaries3d_get_serialize( + page=page, + limit=limit, + cursor=cursor, + start_cursor=start_cursor, + order=order, + sort=sort, + cve=cve, + published=published, + src_country=src_country, + dst_country=dst_country, + src_ip=src_ip, + src_asn=src_asn, + date=date, + updated_at_start_date=updated_at_start_date, + updated_at_end_date=updated_at_end_date, + last_mod_start_date=last_mod_start_date, + last_mod_end_date=last_mod_end_date, + pub_start_date=pub_start_date, + pub_end_date=pub_end_date, + _request_auth=_request_auth, + _content_type=_content_type, + _headers=_headers, + _host_index=_host_index + ) + + _response_types_map: Dict[str, Optional[str]] = { + '200': "RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination", + '404': "str", + '500': "str", + } + response_data = self.api_client.call_api( + *_param, + _request_timeout=_request_timeout + ) + return response_data.response + + + def _index_vulncheck_canaries3d_get_serialize( + self, + page, + limit, + cursor, + start_cursor, + order, + sort, + cve, + published, + src_country, + dst_country, + src_ip, + src_asn, date, updated_at_start_date, updated_at_end_date, @@ -301574,566 +303508,9 @@ def _index_vulncheck_canaries30d_get_serialize( _query_params.append(('src_ip', src_ip)) - if date is not None: - - _query_params.append(('date', date)) - - if updated_at_start_date is not None: - - _query_params.append(('updatedAtStartDate', updated_at_start_date)) - - if updated_at_end_date is not None: - - _query_params.append(('updatedAtEndDate', updated_at_end_date)) - - if last_mod_start_date is not None: - - _query_params.append(('lastModStartDate', last_mod_start_date)) - - if last_mod_end_date is not None: - - _query_params.append(('lastModEndDate', last_mod_end_date)) + if src_asn is not None: - if pub_start_date is not None: - - _query_params.append(('pubStartDate', pub_start_date)) - - if pub_end_date is not None: - - _query_params.append(('pubEndDate', pub_end_date)) - - # process the header parameters - # process the form parameters - # process the body parameter - - - # set the HTTP header `Accept` - if 'Accept' not in _header_params: - _header_params['Accept'] = self.api_client.select_header_accept( - [ - 'application/json' - ] - ) - - - # authentication setting - _auth_settings: List[str] = [ - 'Bearer' - ] - - return self.api_client.param_serialize( - method='GET', - resource_path='/v3/index/vulncheck-canaries-30d', - path_params=_path_params, - query_params=_query_params, - header_params=_header_params, - body=_body_params, - post_params=_form_params, - files=_files, - auth_settings=_auth_settings, - collection_formats=_collection_formats, - _host=_host, - _request_auth=_request_auth - ) - - - - - @validate_call - def index_vulncheck_canaries3d_get( - self, - page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, - limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, - cursor: Annotated[Optional[StrictStr], Field(description="continue server-side paging using a cursor id")] = None, - start_cursor: Annotated[Optional[StrictStr], Field(description="request server-side paging")] = None, - order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, - sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, - cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, - published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, - date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, - updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, - updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, - last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, - last_mod_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending last modified date to filter with.")] = None, - pub_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - pub_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, - _request_timeout: Union[ - None, - Annotated[StrictFloat, Field(gt=0)], - Tuple[ - Annotated[StrictFloat, Field(gt=0)], - Annotated[StrictFloat, Field(gt=0)] - ] - ] = None, - _request_auth: Optional[Dict[StrictStr, Any]] = None, - _content_type: Optional[StrictStr] = None, - _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination: - """Return vulnerability data stored in index \"vulncheck-canaries-3d\" - - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-3d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (3 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-3d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-3d?cursor=` - - :param page: set the page number of the response - :type page: int - :param limit: limit the number of findings in the response - :type limit: int - :param cursor: continue server-side paging using a cursor id - :type cursor: str - :param start_cursor: request server-side paging - :type start_cursor: str - :param order: direction of the sort - :type order: str - :param sort: field by which to sort the results - :type sort: str - :param cve: Specify a CVE ID to search with. - :type cve: str - :param published: Specify a published date - :type published: str - :param src_country: Country code in ISO-3166 format - :type src_country: str - :param dst_country: Country code in ISO-3166 format - :type dst_country: str - :param src_ip: Source IP address - :type src_ip: str - :param date: Specify an exact published date to filter with. - :type date: str - :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. - :type updated_at_start_date: str - :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. - :type updated_at_end_date: str - :param last_mod_start_date: Specify a starting last modified date to filter with. - :type last_mod_start_date: str - :param last_mod_end_date: Specify an ending last modified date to filter with. - :type last_mod_end_date: str - :param pub_start_date: Specify a starting published date to filter with. - :type pub_start_date: str - :param pub_end_date: Specify an ending published date to filter with. - :type pub_end_date: str - :param _request_timeout: timeout setting for this request. If one - number provided, it will be total request - timeout. It can also be a pair (tuple) of - (connection, read) timeouts. - :type _request_timeout: int, tuple(int, int), optional - :param _request_auth: set to override the auth_settings for an a single - request; this effectively ignores the - authentication in the spec for a single request. - :type _request_auth: dict, optional - :param _content_type: force content-type for the request. - :type _content_type: str, Optional - :param _headers: set to override the headers for a single - request; this effectively ignores the headers - in the spec for a single request. - :type _headers: dict, optional - :param _host_index: set to override the host_index for a single - request; this effectively ignores the host_index - in the spec for a single request. - :type _host_index: int, optional - :return: Returns the result object. - """ # noqa: E501 - - _param = self._index_vulncheck_canaries3d_get_serialize( - page=page, - limit=limit, - cursor=cursor, - start_cursor=start_cursor, - order=order, - sort=sort, - cve=cve, - published=published, - src_country=src_country, - dst_country=dst_country, - src_ip=src_ip, - date=date, - updated_at_start_date=updated_at_start_date, - updated_at_end_date=updated_at_end_date, - last_mod_start_date=last_mod_start_date, - last_mod_end_date=last_mod_end_date, - pub_start_date=pub_start_date, - pub_end_date=pub_end_date, - _request_auth=_request_auth, - _content_type=_content_type, - _headers=_headers, - _host_index=_host_index - ) - - _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination", - '404': "str", - '500': "str", - } - response_data = self.api_client.call_api( - *_param, - _request_timeout=_request_timeout - ) - response_data.read() - return self.api_client.response_deserialize( - response_data=response_data, - response_types_map=_response_types_map, - ).data - - - @validate_call - def index_vulncheck_canaries3d_get_with_http_info( - self, - page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, - limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, - cursor: Annotated[Optional[StrictStr], Field(description="continue server-side paging using a cursor id")] = None, - start_cursor: Annotated[Optional[StrictStr], Field(description="request server-side paging")] = None, - order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, - sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, - cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, - published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, - date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, - updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, - updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, - last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, - last_mod_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending last modified date to filter with.")] = None, - pub_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - pub_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, - _request_timeout: Union[ - None, - Annotated[StrictFloat, Field(gt=0)], - Tuple[ - Annotated[StrictFloat, Field(gt=0)], - Annotated[StrictFloat, Field(gt=0)] - ] - ] = None, - _request_auth: Optional[Dict[StrictStr, Any]] = None, - _content_type: Optional[StrictStr] = None, - _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> ApiResponse[RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination]: - """Return vulnerability data stored in index \"vulncheck-canaries-3d\" - - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-3d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (3 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-3d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-3d?cursor=` - - :param page: set the page number of the response - :type page: int - :param limit: limit the number of findings in the response - :type limit: int - :param cursor: continue server-side paging using a cursor id - :type cursor: str - :param start_cursor: request server-side paging - :type start_cursor: str - :param order: direction of the sort - :type order: str - :param sort: field by which to sort the results - :type sort: str - :param cve: Specify a CVE ID to search with. - :type cve: str - :param published: Specify a published date - :type published: str - :param src_country: Country code in ISO-3166 format - :type src_country: str - :param dst_country: Country code in ISO-3166 format - :type dst_country: str - :param src_ip: Source IP address - :type src_ip: str - :param date: Specify an exact published date to filter with. - :type date: str - :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. - :type updated_at_start_date: str - :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. - :type updated_at_end_date: str - :param last_mod_start_date: Specify a starting last modified date to filter with. - :type last_mod_start_date: str - :param last_mod_end_date: Specify an ending last modified date to filter with. - :type last_mod_end_date: str - :param pub_start_date: Specify a starting published date to filter with. - :type pub_start_date: str - :param pub_end_date: Specify an ending published date to filter with. - :type pub_end_date: str - :param _request_timeout: timeout setting for this request. If one - number provided, it will be total request - timeout. It can also be a pair (tuple) of - (connection, read) timeouts. - :type _request_timeout: int, tuple(int, int), optional - :param _request_auth: set to override the auth_settings for an a single - request; this effectively ignores the - authentication in the spec for a single request. - :type _request_auth: dict, optional - :param _content_type: force content-type for the request. - :type _content_type: str, Optional - :param _headers: set to override the headers for a single - request; this effectively ignores the headers - in the spec for a single request. - :type _headers: dict, optional - :param _host_index: set to override the host_index for a single - request; this effectively ignores the host_index - in the spec for a single request. - :type _host_index: int, optional - :return: Returns the result object. - """ # noqa: E501 - - _param = self._index_vulncheck_canaries3d_get_serialize( - page=page, - limit=limit, - cursor=cursor, - start_cursor=start_cursor, - order=order, - sort=sort, - cve=cve, - published=published, - src_country=src_country, - dst_country=dst_country, - src_ip=src_ip, - date=date, - updated_at_start_date=updated_at_start_date, - updated_at_end_date=updated_at_end_date, - last_mod_start_date=last_mod_start_date, - last_mod_end_date=last_mod_end_date, - pub_start_date=pub_start_date, - pub_end_date=pub_end_date, - _request_auth=_request_auth, - _content_type=_content_type, - _headers=_headers, - _host_index=_host_index - ) - - _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination", - '404': "str", - '500': "str", - } - response_data = self.api_client.call_api( - *_param, - _request_timeout=_request_timeout - ) - response_data.read() - return self.api_client.response_deserialize( - response_data=response_data, - response_types_map=_response_types_map, - ) - - - @validate_call - def index_vulncheck_canaries3d_get_without_preload_content( - self, - page: Annotated[Optional[StrictInt], Field(description="set the page number of the response")] = None, - limit: Annotated[Optional[StrictInt], Field(description="limit the number of findings in the response")] = None, - cursor: Annotated[Optional[StrictStr], Field(description="continue server-side paging using a cursor id")] = None, - start_cursor: Annotated[Optional[StrictStr], Field(description="request server-side paging")] = None, - order: Annotated[Optional[StrictStr], Field(description="direction of the sort")] = None, - sort: Annotated[Optional[StrictStr], Field(description="field by which to sort the results")] = None, - cve: Annotated[Optional[StrictStr], Field(description="Specify a CVE ID to search with.")] = None, - published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, - date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, - updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, - updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, - last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, - last_mod_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending last modified date to filter with.")] = None, - pub_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - pub_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, - _request_timeout: Union[ - None, - Annotated[StrictFloat, Field(gt=0)], - Tuple[ - Annotated[StrictFloat, Field(gt=0)], - Annotated[StrictFloat, Field(gt=0)] - ] - ] = None, - _request_auth: Optional[Dict[StrictStr, Any]] = None, - _content_type: Optional[StrictStr] = None, - _headers: Optional[Dict[StrictStr, Any]] = None, - _host_index: Annotated[StrictInt, Field(ge=0, le=1)] = 0, - ) -> RESTResponseType: - """Return vulnerability data stored in index \"vulncheck-canaries-3d\" - - ### Overview This endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-3d index. \\ By default, a maximum of 100 documents are shown per page. **Index Description:** VulnCheck Canary Intel (3 day) ### Paging Over Large Data (cursor) In order to allow users to iterate over large index datasets, this endpoint provides a server-side \"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-3d?start_cursor`, the response will have a `next_cursor` id that clients will need to pass as a query parameter to the next request like `GET /index/vulncheck-canaries-3d?cursor=` - - :param page: set the page number of the response - :type page: int - :param limit: limit the number of findings in the response - :type limit: int - :param cursor: continue server-side paging using a cursor id - :type cursor: str - :param start_cursor: request server-side paging - :type start_cursor: str - :param order: direction of the sort - :type order: str - :param sort: field by which to sort the results - :type sort: str - :param cve: Specify a CVE ID to search with. - :type cve: str - :param published: Specify a published date - :type published: str - :param src_country: Country code in ISO-3166 format - :type src_country: str - :param dst_country: Country code in ISO-3166 format - :type dst_country: str - :param src_ip: Source IP address - :type src_ip: str - :param date: Specify an exact published date to filter with. - :type date: str - :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. - :type updated_at_start_date: str - :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. - :type updated_at_end_date: str - :param last_mod_start_date: Specify a starting last modified date to filter with. - :type last_mod_start_date: str - :param last_mod_end_date: Specify an ending last modified date to filter with. - :type last_mod_end_date: str - :param pub_start_date: Specify a starting published date to filter with. - :type pub_start_date: str - :param pub_end_date: Specify an ending published date to filter with. - :type pub_end_date: str - :param _request_timeout: timeout setting for this request. If one - number provided, it will be total request - timeout. It can also be a pair (tuple) of - (connection, read) timeouts. - :type _request_timeout: int, tuple(int, int), optional - :param _request_auth: set to override the auth_settings for an a single - request; this effectively ignores the - authentication in the spec for a single request. - :type _request_auth: dict, optional - :param _content_type: force content-type for the request. - :type _content_type: str, Optional - :param _headers: set to override the headers for a single - request; this effectively ignores the headers - in the spec for a single request. - :type _headers: dict, optional - :param _host_index: set to override the host_index for a single - request; this effectively ignores the host_index - in the spec for a single request. - :type _host_index: int, optional - :return: Returns the result object. - """ # noqa: E501 - - _param = self._index_vulncheck_canaries3d_get_serialize( - page=page, - limit=limit, - cursor=cursor, - start_cursor=start_cursor, - order=order, - sort=sort, - cve=cve, - published=published, - src_country=src_country, - dst_country=dst_country, - src_ip=src_ip, - date=date, - updated_at_start_date=updated_at_start_date, - updated_at_end_date=updated_at_end_date, - last_mod_start_date=last_mod_start_date, - last_mod_end_date=last_mod_end_date, - pub_start_date=pub_start_date, - pub_end_date=pub_end_date, - _request_auth=_request_auth, - _content_type=_content_type, - _headers=_headers, - _host_index=_host_index - ) - - _response_types_map: Dict[str, Optional[str]] = { - '200': "RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination", - '404': "str", - '500': "str", - } - response_data = self.api_client.call_api( - *_param, - _request_timeout=_request_timeout - ) - return response_data.response - - - def _index_vulncheck_canaries3d_get_serialize( - self, - page, - limit, - cursor, - start_cursor, - order, - sort, - cve, - published, - src_country, - dst_country, - src_ip, - date, - updated_at_start_date, - updated_at_end_date, - last_mod_start_date, - last_mod_end_date, - pub_start_date, - pub_end_date, - _request_auth, - _content_type, - _headers, - _host_index, - ) -> RequestSerialized: - - _hosts = [ - 'https://api.vulncheck.com' - ] - _host = _hosts[_host_index] - - _collection_formats: Dict[str, str] = { - } - - _path_params: Dict[str, str] = {} - _query_params: List[Tuple[str, str]] = [] - _header_params: Dict[str, Optional[str]] = _headers or {} - _form_params: List[Tuple[str, str]] = [] - _files: Dict[ - str, Union[str, bytes, List[str], List[bytes], List[Tuple[str, bytes]]] - ] = {} - _body_params: Optional[bytes] = None - - # process the path parameters - # process the query parameters - if page is not None: - - _query_params.append(('page', page)) - - if limit is not None: - - _query_params.append(('limit', limit)) - - if cursor is not None: - - _query_params.append(('cursor', cursor)) - - if start_cursor is not None: - - _query_params.append(('start_cursor', start_cursor)) - - if order is not None: - - _query_params.append(('order', order)) - - if sort is not None: - - _query_params.append(('sort', sort)) - - if cve is not None: - - _query_params.append(('cve', cve)) - - if published is not None: - - _query_params.append(('published', published)) - - if src_country is not None: - - _query_params.append(('src_country', src_country)) - - if dst_country is not None: - - _query_params.append(('dst_country', dst_country)) - - if src_ip is not None: - - _query_params.append(('src_ip', src_ip)) + _query_params.append(('src_asn', src_asn)) if date is not None: @@ -302214,6 +303591,7 @@ def index_vulncheck_canaries90d_get( src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + src_asn: Annotated[Optional[StrictStr], Field(description="Source ASN in format AS12345")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -302260,6 +303638,8 @@ def index_vulncheck_canaries90d_get( :type dst_country: str :param src_ip: Source IP address :type src_ip: str + :param src_asn: Source ASN in format AS12345 + :type src_asn: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -302308,6 +303688,7 @@ def index_vulncheck_canaries90d_get( src_country=src_country, dst_country=dst_country, src_ip=src_ip, + src_asn=src_asn, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -302351,6 +303732,7 @@ def index_vulncheck_canaries90d_get_with_http_info( src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + src_asn: Annotated[Optional[StrictStr], Field(description="Source ASN in format AS12345")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -302397,6 +303779,8 @@ def index_vulncheck_canaries90d_get_with_http_info( :type dst_country: str :param src_ip: Source IP address :type src_ip: str + :param src_asn: Source ASN in format AS12345 + :type src_asn: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -302445,6 +303829,7 @@ def index_vulncheck_canaries90d_get_with_http_info( src_country=src_country, dst_country=dst_country, src_ip=src_ip, + src_asn=src_asn, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -302488,6 +303873,7 @@ def index_vulncheck_canaries90d_get_without_preload_content( src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + src_asn: Annotated[Optional[StrictStr], Field(description="Source ASN in format AS12345")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -302534,6 +303920,8 @@ def index_vulncheck_canaries90d_get_without_preload_content( :type dst_country: str :param src_ip: Source IP address :type src_ip: str + :param src_asn: Source ASN in format AS12345 + :type src_asn: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -302582,6 +303970,7 @@ def index_vulncheck_canaries90d_get_without_preload_content( src_country=src_country, dst_country=dst_country, src_ip=src_ip, + src_asn=src_asn, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -302620,6 +304009,7 @@ def _index_vulncheck_canaries90d_get_serialize( src_country, dst_country, src_ip, + src_asn, date, updated_at_start_date, updated_at_end_date, @@ -302696,6 +304086,10 @@ def _index_vulncheck_canaries90d_get_serialize( _query_params.append(('src_ip', src_ip)) + if src_asn is not None: + + _query_params.append(('src_asn', src_asn)) + if date is not None: _query_params.append(('date', date)) @@ -302775,6 +304169,7 @@ def index_vulncheck_canaries_get( src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + src_asn: Annotated[Optional[StrictStr], Field(description="Source ASN in format AS12345")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -302821,6 +304216,8 @@ def index_vulncheck_canaries_get( :type dst_country: str :param src_ip: Source IP address :type src_ip: str + :param src_asn: Source ASN in format AS12345 + :type src_asn: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -302869,6 +304266,7 @@ def index_vulncheck_canaries_get( src_country=src_country, dst_country=dst_country, src_ip=src_ip, + src_asn=src_asn, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -302912,6 +304310,7 @@ def index_vulncheck_canaries_get_with_http_info( src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + src_asn: Annotated[Optional[StrictStr], Field(description="Source ASN in format AS12345")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -302958,6 +304357,8 @@ def index_vulncheck_canaries_get_with_http_info( :type dst_country: str :param src_ip: Source IP address :type src_ip: str + :param src_asn: Source ASN in format AS12345 + :type src_asn: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -303006,6 +304407,7 @@ def index_vulncheck_canaries_get_with_http_info( src_country=src_country, dst_country=dst_country, src_ip=src_ip, + src_asn=src_asn, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -303049,6 +304451,7 @@ def index_vulncheck_canaries_get_without_preload_content( src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + src_asn: Annotated[Optional[StrictStr], Field(description="Source ASN in format AS12345")] = None, date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, @@ -303095,6 +304498,8 @@ def index_vulncheck_canaries_get_without_preload_content( :type dst_country: str :param src_ip: Source IP address :type src_ip: str + :param src_asn: Source ASN in format AS12345 + :type src_asn: str :param date: Specify an exact published date to filter with. :type date: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. @@ -303143,6 +304548,7 @@ def index_vulncheck_canaries_get_without_preload_content( src_country=src_country, dst_country=dst_country, src_ip=src_ip, + src_asn=src_asn, date=date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, @@ -303181,6 +304587,7 @@ def _index_vulncheck_canaries_get_serialize( src_country, dst_country, src_ip, + src_asn, date, updated_at_start_date, updated_at_end_date, @@ -303257,6 +304664,10 @@ def _index_vulncheck_canaries_get_serialize( _query_params.append(('src_ip', src_ip)) + if src_asn is not None: + + _query_params.append(('src_asn', src_asn)) + if date is not None: _query_params.append(('date', date)) diff --git a/vulncheck_sdk/api_client.py b/vulncheck_sdk/api_client.py index 52a5b7b0..f7b43000 100644 --- a/vulncheck_sdk/api_client.py +++ b/vulncheck_sdk/api_client.py @@ -92,7 +92,7 @@ def __init__( self.default_headers[header_name] = header_value self.cookie = cookie # Set default User-Agent. - self.user_agent = 'OpenAPI-Generator/0.0.45/python' + self.user_agent = 'OpenAPI-Generator/0.0.46/python' self.client_side_validation = configuration.client_side_validation def __enter__(self): diff --git a/vulncheck_sdk/configuration.py b/vulncheck_sdk/configuration.py index 167b21b1..dc260805 100644 --- a/vulncheck_sdk/configuration.py +++ b/vulncheck_sdk/configuration.py @@ -537,7 +537,7 @@ def to_debug_report(self) -> str: "OS: {env}\n"\ "Python Version: {pyversion}\n"\ "Version of the API: latest\n"\ - "SDK Package Version: 0.0.45".\ + "SDK Package Version: 0.0.46".\ format(env=sys.platform, pyversion=sys.version) def get_host_settings(self) -> List[HostSetting]: diff --git a/vulncheck_sdk/models/api_vuln_check_canary.py b/vulncheck_sdk/models/api_vuln_check_canary.py index 15cc2be7..154e7afd 100644 --- a/vulncheck_sdk/models/api_vuln_check_canary.py +++ b/vulncheck_sdk/models/api_vuln_check_canary.py @@ -38,11 +38,14 @@ class ApiVulnCheckCanary(BaseModel): severity: Optional[StrictInt] = None signature: Optional[StrictStr] = None signature_id: Optional[StrictInt] = None + src_as_domain: Optional[StrictStr] = None + src_as_name: Optional[StrictStr] = None + src_asn: Optional[StrictStr] = None src_country: Optional[StrictStr] = None src_ip: Optional[StrictStr] = None src_port: Optional[StrictInt] = None timestamp: Optional[StrictStr] = None - __properties: ClassVar[List[str]] = ["category", "client_fingerprints", "cve", "dst_country", "http", "payload", "severity", "signature", "signature_id", "src_country", "src_ip", "src_port", "timestamp"] + __properties: ClassVar[List[str]] = ["category", "client_fingerprints", "cve", "dst_country", "http", "payload", "severity", "signature", "signature_id", "src_as_domain", "src_as_name", "src_asn", "src_country", "src_ip", "src_port", "timestamp"] model_config = ConfigDict( populate_by_name=True, @@ -110,6 +113,9 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: "severity": obj.get("severity"), "signature": obj.get("signature"), "signature_id": obj.get("signature_id"), + "src_as_domain": obj.get("src_as_domain"), + "src_as_name": obj.get("src_as_name"), + "src_asn": obj.get("src_asn"), "src_country": obj.get("src_country"), "src_ip": obj.get("src_ip"), "src_port": obj.get("src_port"),