<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Querying openVuln API using Date Ranges in Services Discussions</title>
    <link>https://community.cisco.com/t5/services-discussions/querying-openvuln-api-using-date-ranges/m-p/3430450#M16</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Walter,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;QQ: Are you using Postman? You should definitely not be seeing a 500 back. I also just tested with Postman. The only difference when you use postman is that you need to specify .json in the URL, as I include in the screenshot below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Screen Shot 2017-10-10 at 4.10.38 PM.png" class="image-1 jive-image" src="/legacyfs/online/fusion/111897_Screen Shot 2017-10-10 at 4.10.38 PM.png" style="height: 431px; width: 620px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 10 Oct 2017 22:13:52 GMT</pubDate>
    <dc:creator>Omar Santos</dc:creator>
    <dc:date>2017-10-10T22:13:52Z</dc:date>
    <item>
      <title>Querying openVuln API using Date Ranges</title>
      <link>https://community.cisco.com/t5/services-discussions/querying-openvuln-api-using-date-ranges/m-p/3430446#M12</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, 'Liberation Sans', FreeSans, sans-serif; font-size: 12px;"&gt;You can now query advisories (CVRF) and OVAL definitions using a "first published" date range, as shown below:&lt;/SPAN&gt;&lt;/P&gt;&lt;PRE class="code" style="margin: 0 0 20px; font-size: 12px; background-position: initial; color: #000000;"&gt;https://api.cisco.com/security/advisories/cvrf/all/firstpublished?startDate=2017-01-01&amp;amp;endDate=2017-02-15&lt;/PRE&gt;&lt;PRE style="margin: 0 0 20px; font-size: 12px; background-position: initial; color: #000000;"&gt;https://api.cisco.com/security/advisories/oval/all/firstpublished?startDate=2017-01-01&amp;amp;endDate=2017-02-15&lt;/PRE&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, 'Liberation Sans', FreeSans, sans-serif; font-size: 12px;"&gt;You can also query using the advisories that were updated in a given date range, as demonstrated below:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE style="margin: 0 0 20px; font-size: 12px; background-position: initial; color: #000000;"&gt;https://api.cisco.com/security/advisories/cvrf/all/lastpublished?startDate=2017-01-01&amp;amp;endDate=2017-02-15 https://api.cisco.com/security/advisories/oval/all/lastpublished?startDate=2017-01-01&amp;amp;endDate=2017-02-15&lt;/PRE&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, 'Liberation Sans', FreeSans, sans-serif; font-size: 12px;"&gt;The same concept applies when querying advisories that have a given security impact rating:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE style="margin: 0 0 20px; font-size: 12px; background-position: initial; color: #000000;"&gt;https://api.cisco.com/security/advisories/cvrf/severity/critical/lastpublished?startDate=2017-01-01&amp;amp;endDate=2017-02-15&lt;/PRE&gt;&lt;PRE style="margin: 0 0 20px; font-size: 12px; background-position: initial; color: #000000;"&gt;https://api.cisco.com/security/advisories/cvrf/severity/high/firstpublished?startDate=2017-01-01&amp;amp;endDate=2017-02-15&lt;/PRE&gt;&lt;P&gt;This is also documented at: &lt;A href="https://developer.cisco.com/site/PSIRT/get-started/getting-started.gsp" title="https://developer.cisco.com/site/PSIRT/get-started/getting-started.gsp"&gt;https://developer.cisco.com/site/PSIRT/get-started/getting-started.gsp&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jan 2017 18:26:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/services-discussions/querying-openvuln-api-using-date-ranges/m-p/3430446#M12</guid>
      <dc:creator>Omar Santos</dc:creator>
      <dc:date>2017-01-18T18:26:24Z</dc:date>
    </item>
    <item>
      <title>Re: Querying openVuln API using Date Ranges</title>
      <link>https://community.cisco.com/t5/services-discussions/querying-openvuln-api-using-date-ranges/m-p/3430447#M13</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I was attempting to specify a date range, as described on &lt;A href="https://developer.cisco.com/site/PSIRT/get-started/getting-started.gsp"&gt;&lt;SPAN style="color: windowtext;"&gt;https://developer.cisco.com/site/PSIRT/get-started/getting-started.gsp&lt;/SPAN&gt;&lt;/A&gt; under “Querying Using a Date Range”, I ran into some issues.&amp;nbsp; It seems the only response to any date-range query is a web page referencing “internal error” (see below).&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H1 style="font-family: Tahoma, Arial, sans-serif; color: white; background-color: #525d76; font-size: 22px;"&gt;HTTP Status 500 - org.apache.cxf.interceptor.Fault&lt;/H1&gt;&lt;HR noshade="noshade" size="1" style="color: #525d76; font-family: Tahoma, Arial, sans-serif; font-size: medium;" /&gt;&lt;P style="font-family: Tahoma, Arial, sans-serif; background: #ffffff; color: #000000; font-size: 12px;"&gt;&lt;STRONG style="color: white; background-color: #525d76;"&gt;type&lt;/STRONG&gt; Exception report&lt;/P&gt;&lt;P style="font-family: Tahoma, Arial, sans-serif; background: #ffffff; color: #000000; font-size: 12px;"&gt;&lt;STRONG style="color: white; background-color: #525d76;"&gt;message&lt;/STRONG&gt; &lt;SPAN style="text-decoration: underline;"&gt;org.apache.cxf.interceptor.Fault&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-family: Tahoma, Arial, sans-serif; background: #ffffff; color: #000000; font-size: 12px;"&gt;&lt;STRONG style="color: white; background-color: #525d76;"&gt;description&lt;/STRONG&gt; &lt;SPAN style="text-decoration: underline;"&gt;The server encountered an internal error that prevented it from fulfilling this request.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-family: Tahoma, Arial, sans-serif; background: #ffffff; color: #000000; font-size: 12px;"&gt;&lt;STRONG style="color: white; background-color: #525d76;"&gt;exception&lt;/STRONG&gt;&lt;/P&gt;&lt;PRE style="color: #000000;"&gt;java.lang.RuntimeException: org.apache.cxf.interceptor.Fault org.apache.cxf.interceptor.AbstractFaultChainInitiatorObserver.onMessage(AbstractFaultChainInitiatorObserver.java:116) org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseInterceptorChain.java:371) org.apache.cxf.transport.ChainInitiationObserver.onMessage(ChainInitiationObserver.java:121) org.apache.cxf.transport.http.AbstractHTTPDestination.invoke(AbstractHTTPDestination.java:243) org.apache.cxf.transport.servlet.ServletController.invokeDestination(ServletController.java:223) org.apache.cxf.transport.servlet.ServletController.invoke(ServletController.java:197) org.apache.cxf.transport.servlet.ServletController.invoke(ServletController.java:149) org.apache.cxf.transport.servlet.CXFNonSpringServlet.invoke(CXFNonSpringServlet.java:171) org.apache.cxf.transport.servlet.AbstractHTTPServlet.handleRequest(AbstractHTTPServlet.java:286) org.apache.cxf.transport.servlet.AbstractHTTPServlet.doGet(AbstractHTTPServlet.java:211) javax.servlet.http.HttpServlet.service(HttpServlet.java:620) org.apache.cxf.transport.servlet.AbstractHTTPServlet.service(AbstractHTTPServlet.java:262) org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52) &lt;/PRE&gt;&lt;P style="font-family: Tahoma, Arial, sans-serif; background: #ffffff; color: #000000; font-size: 12px;"&gt;&lt;/P&gt;&lt;P style="font-family: Tahoma, Arial, sans-serif; background: #ffffff; color: #000000; font-size: 12px;"&gt;&lt;STRONG style="color: white; background-color: #525d76;"&gt;root cause&lt;/STRONG&gt;&lt;/P&gt;&lt;PRE style="color: #000000;"&gt;org.apache.cxf.interceptor.Fault org.apache.cxf.service.invoker.AbstractInvoker.createFault(AbstractInvoker.java:163) org.apache.cxf.service.invoker.AbstractInvoker.invoke(AbstractInvoker.java:129) org.apache.cxf.jaxrs.JAXRSInvoker.invoke(JAXRSInvoker.java:211) org.apache.cxf.jaxrs.JAXRSInvoker.invoke(JAXRSInvoker.java:99) org.apache.cxf.interceptor.ServiceInvokerInterceptor$1.run(ServiceInvokerInterceptor.java:59) org.apache.cxf.interceptor.ServiceInvokerInterceptor.handleMessage(ServiceInvokerInterceptor.java:96) org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseInterceptorChain.java:307) org.apache.cxf.transport.ChainInitiationObserver.onMessage(ChainInitiationObserver.java:121) org.apache.cxf.transport.http.AbstractHTTPDestination.invoke(AbstractHTTPDestination.java:243) org.apache.cxf.transport.servlet.ServletController.invokeDestination(ServletController.java:223) org.apache.cxf.transport.servlet.ServletController.invoke(ServletController.java:197) org.apache.cxf.transport.servlet.ServletController.invoke(ServletController.java:149) org.apache.cxf.transport.servlet.CXFNonSpringServlet.invoke(CXFNonSpringServlet.java:171) org.apache.cxf.transport.servlet.AbstractHTTPServlet.handleRequest(AbstractHTTPServlet.java:286) org.apache.cxf.transport.servlet.AbstractHTTPServlet.doGet(AbstractHTTPServlet.java:211) javax.servlet.http.HttpServlet.service(HttpServlet.java:620) org.apache.cxf.transport.servlet.AbstractHTTPServlet.service(AbstractHTTPServlet.java:262) org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52) &lt;/PRE&gt;&lt;P style="font-family: Tahoma, Arial, sans-serif; background: #ffffff; color: #000000; font-size: 12px;"&gt;&lt;/P&gt;&lt;P style="font-family: Tahoma, Arial, sans-serif; background: #ffffff; color: #000000; font-size: 12px;"&gt;&lt;STRONG style="color: white; background-color: #525d76;"&gt;root cause&lt;/STRONG&gt;&lt;/P&gt;&lt;PRE style="color: #000000;"&gt;java.lang.NullPointerException com.cisco.csc.rest.util.DateHandler.checkDateFormat(DateHandler.java:27) com.cisco.csc.rest.controller.OpenVulServiceEndpointImpl.getAdvisoriesByFirstPublishedIncvrfFormat(OpenVulServiceEndpointImpl.java:356) sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:57) sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) java.lang.reflect.Method.invoke(Method.java:606) org.apache.cxf.service.invoker.AbstractInvoker.performInvocation(AbstractInvoker.java:181) org.apache.cxf.service.invoker.AbstractInvoker.invoke(AbstractInvoker.java:97) org.apache.cxf.jaxrs.JAXRSInvoker.invoke(JAXRSInvoker.java:211) org.apache.cxf.jaxrs.JAXRSInvoker.invoke(JAXRSInvoker.java:99) org.apache.cxf.interceptor.ServiceInvokerInterceptor$1.run(ServiceInvokerInterceptor.java:59) org.apache.cxf.interceptor.ServiceInvokerInterceptor.handleMessage(ServiceInvokerInterceptor.java:96) org.apache.cxf.phase.PhaseInterceptorChain.doIntercept(PhaseInterceptorChain.java:307) org.apache.cxf.transport.ChainInitiationObserver.onMessage(ChainInitiationObserver.java:121) org.apache.cxf.transport.http.AbstractHTTPDestination.invoke(AbstractHTTPDestination.java:243) org.apache.cxf.transport.servlet.ServletController.invokeDestination(ServletController.java:223) org.apache.cxf.transport.servlet.ServletController.invoke(ServletController.java:197) org.apache.cxf.transport.servlet.ServletController.invoke(ServletController.java:149) org.apache.cxf.transport.servlet.CXFNonSpringServlet.invoke(CXFNonSpringServlet.java:171) org.apache.cxf.transport.servlet.AbstractHTTPServlet.handleRequest(AbstractHTTPServlet.java:286) org.apache.cxf.transport.servlet.AbstractHTTPServlet.doGet(AbstractHTTPServlet.java:211) javax.servlet.http.HttpServlet.service(HttpServlet.java:620) org.apache.cxf.transport.servlet.AbstractHTTPServlet.service(AbstractHTTPServlet.java:262) org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52) &lt;/PRE&gt;&lt;P style="font-family: Tahoma, Arial, sans-serif; background: #ffffff; color: #000000; font-size: 12px;"&gt;&lt;/P&gt;&lt;P style="font-family: Tahoma, Arial, sans-serif; background: #ffffff; color: #000000; font-size: 12px;"&gt;&lt;STRONG style="color: white; background-color: #525d76;"&gt;note&lt;/STRONG&gt; &lt;SPAN style="text-decoration: underline;"&gt;The full stack trace of the root cause is available in the Apache Tomcat/7.0.54 logs.&lt;/SPAN&gt;&lt;/P&gt;&lt;HR noshade="noshade" size="1" style="color: #525d76; font-family: Tahoma, Arial, sans-serif; font-size: medium;" /&gt;&lt;H3 style="font-family: Tahoma, Arial, sans-serif; color: white; background-color: #525d76; font-size: 14px;"&gt;Apache Tomcat/7.0.54&lt;/H3&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Current question: Is there an alternative method to obtain a date-range query, or is this no longer supported?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Oct 2017 20:46:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/services-discussions/querying-openvuln-api-using-date-ranges/m-p/3430447#M13</guid>
      <dc:creator>Walter Thompson</dc:creator>
      <dc:date>2017-10-10T20:46:05Z</dc:date>
    </item>
    <item>
      <title>Re: Querying openVuln API using Date Ranges</title>
      <link>https://community.cisco.com/t5/services-discussions/querying-openvuln-api-using-date-ranges/m-p/3430448#M14</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Walter,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for reaching out. I am not able to reproduce that problem. I also tested it using the openVulnQuery client as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;TABLE border="1"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;
&lt;P&gt;bash-3.2$ openVulnQuery --cvrf --severity critical --first_published 2017-01-01:2017-10-01&lt;/P&gt;
&lt;P&gt;[&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; {&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "advisory_id": "cisco-sa-20170315-ap1800",&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "advisory_title": "Cisco Mobility Express 1800 Access Point Series Authentication Bypass Vulnerability",&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "bug_ids": [&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "CSCuy68219"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ],&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "cves": [&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "CVE-2017-3831"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ],&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "cvrf_url": "&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/security/center/contentxml/CiscoSecurityAdvisory/cisco-sa-20170315-ap1800/cvrf/cisco-sa-20170315-ap1800_cvrf.xml" rel="nofollow" target="_blank"&gt;https://tools.cisco.com/security/center/contentxml/CiscoSecurityAdvisory/cisco-sa-20170315-ap1800/cvrf/cisco-sa-20170315-ap1800_cvrf.xml&lt;/A&gt;&lt;SPAN&gt;",&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "cvss_base_score": "9.8",&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "cwe": [&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "CWE-264"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ],&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "first_published": "2017-03-15T16:00:00-0500",&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "last_updated": "2017-10-06T14:32:50-0500",&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "product_names": [&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "Cisco Mobility Express "&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ],&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "publication_url": "&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-ap1800" rel="nofollow" target="_blank"&gt;https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-ap1800&lt;/A&gt;&lt;SPAN&gt;",&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "sir": "Critical",&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "summary": "A vulnerability in the web-based GUI of Cisco Mobility&amp;nbsp;Express 1800 Series Access Points could allow an unauthenticated, remote attacker to bypass authentication. The attacker could be granted full administrator privileges.&amp;lt;br /&amp;gt;\n&amp;lt;br /&amp;gt;\nThe vulnerability is due to improper implementation of authentication for accessing&amp;nbsp;certain web pages using the GUI interface. An attacker could exploit this vulnerability&amp;nbsp;by sending a crafted HTTP request to the web interface of the affected system. A successful&amp;nbsp;exploit could allow the attacker to bypass authentication and perform unauthorized configuration&amp;nbsp;changes or issue control commands to the affected device.&amp;lt;br /&amp;gt;\n&amp;lt;br /&amp;gt;\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.&amp;lt;br /&amp;gt;\n&amp;lt;br /&amp;gt;\nThis advisory is available at the following link:&amp;lt;br /&amp;gt;\n&amp;lt;a href=\"&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-ap1800" rel="nofollow" target="_blank"&gt;https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-ap1800&lt;/A&gt;&lt;SPAN&gt;\"&amp;gt;&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-ap1800" rel="nofollow" target="_blank"&gt;https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-ap1800&lt;/A&gt;&lt;SPAN&gt;&amp;lt;/a&amp;gt;"&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; },&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; {&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "advisory_id": "cisco-sa-20170419-cimc3",&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "advisory_title": "Cisco Integrated Management Controller Remote Code Execution Vulnerability",&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "bug_ids": [&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "CSCvd14578",&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "CSCve48833"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ],&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "cves": [&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "CVE-2017-6616"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ],&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "cvrf_url": "&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/security/center/contentxml/CiscoSecurityAdvisory/cisco-sa-20170419-cimc3/cvrf/cisco-sa-20170419-cimc3_cvrf.xml" rel="nofollow" target="_blank"&gt;https://tools.cisco.com/security/center/contentxml/CiscoSecurityAdvisory/cisco-sa-20170419-cimc3/cvrf/cisco-sa-20170419-cimc3_cvrf.xml&lt;/A&gt;&lt;SPAN&gt;",&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "cvss_base_score": "9.8",&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "cwe": [&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "CWE-20"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ],&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "first_published": "2017-04-19T16:00:00-0500",&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "last_updated": "2017-10-03T20:37:11-0500",&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "product_names": [&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "Cisco Unified Computing System (Management Software) "&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ],&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "publication_url": "&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-cimc3" rel="nofollow" target="_blank"&gt;https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-cimc3&lt;/A&gt;&lt;SPAN&gt;",&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "sir": "Critical",&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "summary": "A vulnerability in the web-based GUI of Cisco Integrated Management Controller (IMC) could allow an unauthenticated, remote attacker to perform unauthorized remote command execution on the affected device.&amp;lt;br /&amp;gt;\n&amp;lt;br /&amp;gt;\nThe vulnerability exists because the affected software does not sufficiently sanitize specific values that are received as part of a user-supplied HTTP request. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected software. Successful exploitation could allow an unauthenticated attacker to execute system commands with &amp;lt;em&amp;gt;root&amp;lt;/em&amp;gt;-level privileges.&amp;lt;br /&amp;gt;\n&amp;lt;br /&amp;gt;\nThere are no workarounds that address this vulnerability.&amp;lt;br /&amp;gt;\n&amp;lt;br /&amp;gt;\nThis advisory is available at the following link:&amp;lt;br /&amp;gt;\n&amp;lt;a href=\"&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-cimc3" rel="nofollow" target="_blank"&gt;https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-cimc3&lt;/A&gt;&lt;SPAN&gt;\"&amp;gt;&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-cimc3" rel="nofollow" target="_blank"&gt;https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-cimc3&lt;/A&gt;&lt;SPAN&gt;&amp;lt;/a&amp;gt;"&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; },&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; {&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "advisory_id": "cisco-sa-20170907-struts2",&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "advisory_title": "Multiple Vulnerabilities in Apache Struts 2 Affecting Cisco Products: September 2017",&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "bug_ids": [&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "NA"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ],&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "cves": [&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "CVE-2017-9793",&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "CVE-2017-9804",&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "CVE-2017-9805"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ],&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "cvrf_url": "&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/security/center/contentxml/CiscoSecurityAdvisory/cisco-sa-20170907-struts2/cvrf/cisco-sa-20170907-struts2_cvrf.xml" rel="nofollow" target="_blank"&gt;https://tools.cisco.com/security/center/contentxml/CiscoSecurityAdvisory/cisco-sa-20170907-struts2/cvrf/cisco-sa-20170907-struts2_cvrf.xml&lt;/A&gt;&lt;SPAN&gt;",&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "cvss_base_score": "NA",&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "cwe": [&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "CWE-20",&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "CWE-399"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ],&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "first_published": "2017-09-07T21:00:00-0500",&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "last_updated": "2017-10-03T19:43:29-0500",&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "product_names": [&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "NA"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ],&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "publication_url": "&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170907-struts2" rel="nofollow" target="_blank"&gt;https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170907-struts2&lt;/A&gt;&lt;SPAN&gt;",&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "sir": "Critical",&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "summary": "On September 5, 2017, the Apache Software Foundation released security bulletins that disclosed three vulnerabilities in the Apache Struts 2 package. Of these vulnerabilities, the Apache Software Foundation classifies one as &amp;lt;em&amp;gt;Critical Severity&amp;lt;/em&amp;gt;, one as &amp;lt;em&amp;gt;Medium Severity&amp;lt;/em&amp;gt;, and one as &amp;lt;em&amp;gt;Low Severity&amp;lt;/em&amp;gt;. For more information about the vulnerabilities, refer to the &amp;lt;a href=\"#details\"&amp;gt;Details&amp;lt;/a&amp;gt; section of this advisory.&amp;lt;br /&amp;gt;\n&amp;lt;br /&amp;gt;\nMultiple Cisco products incorporate a version of the Apache Struts 2 package that is affected by these vulnerabilities. &amp;lt;br /&amp;gt;\n&amp;lt;br /&amp;gt;\nThe following Snort rule can be used to detect possible exploitation of this vulnerability: Snort SIDs 44315 and 44327 through 44330.\n&amp;lt;br /&amp;gt;\n&amp;lt;br /&amp;gt;\nThis advisory is available at the following link:&amp;lt;br /&amp;gt;\n&amp;lt;a href=\"&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170907-struts2" rel="nofollow" target="_blank"&gt;https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170907-struts2&lt;/A&gt;&lt;SPAN&gt;\"&amp;gt;&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170907-struts2" rel="nofollow" target="_blank"&gt;https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170907-struts2&lt;/A&gt;&lt;SPAN&gt;&amp;lt;/a&amp;gt;"&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; },&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; {&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "advisory_id": "cisco-sa-20170909-struts2-rce",&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "advisory_title": "Apache Struts 2 Remote Code Execution Vulnerability Affecting Multiple Cisco Products: September 2017",&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "bug_ids": [&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "NA"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ],&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "cves": [&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "CVE-2017-12611"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ],&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "cvrf_url": "&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/security/center/contentxml/CiscoSecurityAdvisory/cisco-sa-20170909-struts2-rce/cvrf/cisco-sa-20170909-struts2-rce_cvrf.xml" rel="nofollow" target="_blank"&gt;https://tools.cisco.com/security/center/contentxml/CiscoSecurityAdvisory/cisco-sa-20170909-struts2-rce/cvrf/cisco-sa-20170909-struts2-rce_cvrf.xml&lt;/A&gt;&lt;SPAN&gt;",&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "cvss_base_score": "NA",&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "cwe": [&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "CWE-20"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ],&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&amp;lt;&amp;lt;output omitted for brevity&amp;gt;&amp;gt;&lt;/P&gt;
&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BLOCKQUOTE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Oct 2017 20:57:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/services-discussions/querying-openvuln-api-using-date-ranges/m-p/3430448#M14</guid>
      <dc:creator>Omar Santos</dc:creator>
      <dc:date>2017-10-10T20:57:36Z</dc:date>
    </item>
    <item>
      <title>Re: Querying openVuln API using Date Ranges</title>
      <link>https://community.cisco.com/t5/services-discussions/querying-openvuln-api-using-date-ranges/m-p/3430449#M15</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for the quick reply. Glad to know it is working as expected. What do you think would be the reason for the 500 error I am getting in response to the date range query?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Oct 2017 22:08:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/services-discussions/querying-openvuln-api-using-date-ranges/m-p/3430449#M15</guid>
      <dc:creator>Walter Thompson</dc:creator>
      <dc:date>2017-10-10T22:08:22Z</dc:date>
    </item>
    <item>
      <title>Re: Querying openVuln API using Date Ranges</title>
      <link>https://community.cisco.com/t5/services-discussions/querying-openvuln-api-using-date-ranges/m-p/3430450#M16</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Walter,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;QQ: Are you using Postman? You should definitely not be seeing a 500 back. I also just tested with Postman. The only difference when you use postman is that you need to specify .json in the URL, as I include in the screenshot below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Screen Shot 2017-10-10 at 4.10.38 PM.png" class="image-1 jive-image" src="/legacyfs/online/fusion/111897_Screen Shot 2017-10-10 at 4.10.38 PM.png" style="height: 431px; width: 620px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Oct 2017 22:13:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/services-discussions/querying-openvuln-api-using-date-ranges/m-p/3430450#M16</guid>
      <dc:creator>Omar Santos</dc:creator>
      <dc:date>2017-10-10T22:13:52Z</dc:date>
    </item>
    <item>
      <title>Re: Querying openVuln API using Date Ranges</title>
      <link>https://community.cisco.com/t5/services-discussions/querying-openvuln-api-using-date-ranges/m-p/3430451#M17</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I neglected to take into account I was working from a Unix shell prompt.&amp;nbsp; When I re-examined the date range specification, I realized that the “&amp;amp;” character was being interpreted by the shell, causing the problem.&amp;nbsp; Escaping this character eliminated the issue, and I’m now receiving date-range data.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I sincerely appreciate all your help!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Oct 2017 17:01:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/services-discussions/querying-openvuln-api-using-date-ranges/m-p/3430451#M17</guid>
      <dc:creator>Walter Thompson</dc:creator>
      <dc:date>2017-10-11T17:01:51Z</dc:date>
    </item>
    <item>
      <title>Re: Querying openVuln API using Date Ranges</title>
      <link>https://community.cisco.com/t5/services-discussions/querying-openvuln-api-using-date-ranges/m-p/3430452#M18</link>
      <description>&lt;P&gt;The &lt;A href="https://developer.cisco.com/site/PSIRT/discover/overview/" target="_blank"&gt;Cisco PSIRT openVuln API&lt;/A&gt; can be accessed via &lt;A href="https://apiconsole.cisco.com/" target="_blank"&gt;Cisco’s API Console&lt;/A&gt;. Cisco’s&amp;nbsp; to access and consume Cisco data in the cloud in a simple, secure and scalable manner. The console provides a simplified, guided experience, through which partners and customers can easily learn about these services and integrate them within their internal tools, systems and applications; secure data and credentials using industry standard authentication and role-based authorization; and scalability to support diverse data consumption scenarios, like mobile apps, smart devices and Web applications.&lt;/P&gt;&lt;P&gt;The Cisco API Console Documentation explains the steps necessary to obtain oAuth2 credentials and using Cisco's API Console for the registration of a client application that will call the Cisco PSIRT openVuln API.&lt;/P&gt;&lt;P&gt;Check double times your true date range from&amp;nbsp;&lt;A href="https://calculator.date/" target="_self"&gt;https://calculator.date/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jun 2023 09:44:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/services-discussions/querying-openvuln-api-using-date-ranges/m-p/3430452#M18</guid>
      <dc:creator>10.0.0.0.1</dc:creator>
      <dc:date>2023-06-09T09:44:51Z</dc:date>
    </item>
    <item>
      <title>Re: Querying openVuln API using Date Ranges</title>
      <link>https://community.cisco.com/t5/services-discussions/querying-openvuln-api-using-date-ranges/m-p/3430453#M19</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Awesome!!! Glad that it's working for you!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Oct 2017 21:36:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/services-discussions/querying-openvuln-api-using-date-ranges/m-p/3430453#M19</guid>
      <dc:creator>Omar Santos</dc:creator>
      <dc:date>2017-10-11T21:36:03Z</dc:date>
    </item>
  </channel>
</rss>

