<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Massive Data Integrity Issues - Why the API is Worthless in Services Discussions</title>
    <link>https://community.cisco.com/t5/services-discussions/massive-data-integrity-issues-why-the-api-is-worthless/m-p/3507381#M172</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Omar,&lt;/P&gt;&lt;P&gt;hmmm, i am wondering why CVRF is the Problem here, only more lines with product IDs need to be added.&lt;/P&gt;&lt;P&gt;My script does not care if there are 10 or 30 XML tags with product IDs, i don't see in the Standard that there is a limitation.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 07 Nov 2016 09:07:00 GMT</pubDate>
    <dc:creator>klohse</dc:creator>
    <dc:date>2016-11-07T09:07:00Z</dc:date>
    <item>
      <title>Massive Data Integrity Issues - Why the API is Worthless</title>
      <link>https://community.cisco.com/t5/services-discussions/massive-data-integrity-issues-why-the-api-is-worthless/m-p/3507370#M161</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't mean to be too inflammatory, but the data behind the API is all but worthless in its current state.&amp;nbsp; There is little to no consistency with how Product ID's, or thereby the software versions, are written.&amp;nbsp; Take the following OS: IOS-XE 3.10S.1. There are four &lt;IMG src="https://community.cisco.com/legacyfs/online/emoticons/alert.png" /&gt; variations on how the advisories reference this one piece of software.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Cisco IOS XE Software 3.10S 3.10.01S&lt;/LI&gt;&lt;LI&gt;Cisco IOS XE Software 3.10S 3.10.1S&lt;/LI&gt;&lt;LI&gt;Cisco IOS XE Software 3.10S.01&lt;/LI&gt;&lt;LI&gt;Cisco IOS XE Software 3.10S.1&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And here is a list of those advisories and how they are "linked".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __default_attr="javascript" __jive_macro_name="code" class="jive_text_macro jive_macro_code _jivemacro_uid_14734439870418998" jivemacro_uid="_14734439870418998"&gt;
&lt;P&gt;{'id': u'cisco-sa-20140326-ipv6',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS XE Software 3.10S 3.10.1S'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20140326-sip',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS XE Software 3.10S 3.10.1S'}&lt;/P&gt;
&lt;P&gt;{'id': u'Cisco-SA-20140428-CVE-2014-2183',&amp;nbsp; 'software': u'Cisco IOS XE Software 3.10S 3.10.1S'}&lt;/P&gt;
&lt;P&gt;{'id': u'Cisco-SA-20140709-CVE-2014-3309',&amp;nbsp; 'software': u'Cisco IOS XE Software 3.10S 3.10.1S'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20140924-metadata',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS XE Software 3.10S 3.10.1S'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20140924-sip',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS XE Software 3.10S 3.10.1S'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20140926-bash',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS XE Software 3.10S 3.10.1S'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20141015-poodle',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS XE Software 3.10S.1'}&lt;/P&gt;
&lt;P&gt;{'id': u'Cisco-SA-20150113-CVE-2015-0204',&amp;nbsp; 'software': u'Cisco IOS XE Software 3.10S 3.10.1S'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20150310-ssl',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS XE Software 3.10S 3.10.1S'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20150325-ani',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS XE Software 3.10S 3.10.1S'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20150325-ikev2',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS XE Software 3.10S 3.10.1S'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20150325-iosxe',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS XE Software 3.10S.1'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20150325-mdns',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS XE Software 3.10S 3.10.1S'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20150325-tcpleak',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS XE Software 3.10S 3.10.1S'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20150408-ntpd',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS XE Software 3.10S 3.10.1S'}&lt;/P&gt;
&lt;P&gt;{'id': u'Cisco-SA-20150729-CVE-2015-4293',&amp;nbsp; 'software': u'Cisco IOS XE Software 3.10S 3.10.1S'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20150923-fhs',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS XE Software 3.10S 3.10.1S'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20150923-fhs',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS XE Software 3.10S 3.10.01S'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20150923-iosxe',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS XE Software 3.10S.1'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20150923-iosxe',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS XE Software 3.10S.01'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20150923-sshpk',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS XE Software 3.10S 3.10.1S'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20150923-sshpk',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS XE Software 3.10S 3.10.01S'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20151021-ntp',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS XE Software 3.10S 3.10.1S'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20151130-iosxe3s',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS XE Software 3.10S 3.10.1S'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20151130-iosxe3s',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS XE Software 3.10S 3.10.01S'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20160127-ntpd',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS XE Software 3.10S 3.10.1S'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20160323-dhcpv6',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS XE Software 3.10S 3.10.1S'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20160323-ios-ikev2',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS XE Software 3.10S 3.10.1S'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20160323-sip',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS XE Software 3.10S 3.10.1S'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20160419-ios',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS XE Software 3.10S 3.10.1S'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20160419-ios',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS XE Software 3.10S 3.10.01S'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20160525-ipv6',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS XE Software 3.10S 3.10.1S'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20160525-ipv6',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS XE Software 3.10S 3.10.01S'}&lt;/P&gt;
&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Further, the SNMP value comes out as "03.10.01S".&amp;nbsp; Some IOS-XE are "03.06.03.E" or "03.04.06.SG".&amp;nbsp; Not to mention IOS-XE can be represented as 3.6.0S or 15.2(2)S.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regular IOS has both:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Cisco IOS Software 12.4(7)&lt;/LI&gt;&lt;LI&gt;Cisco IOS 12.4(7)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here are the advisories and softwares for this one software.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __default_attr="javascript" __jive_macro_name="code" class="jive_text_macro jive_macro_code _jivemacro_uid_14734447899309682" jivemacro_uid="_14734447899309682"&gt;
&lt;P&gt;{'id': u'cisco-sa-20070110-dlsw',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS 12.4(7)'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20070131-sip',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS 12.4(7)'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20070509-iosftp',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS 12.4(7)'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20070522-crypto',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS 12.4(7)'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20070522-SSL',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS 12.4(7)'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20070808-IOS-voice',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS 12.4(7)'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20080326-dlsw',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS 12.4(7)'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20080708-dns',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS 12.4(7)'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20080924-iosips',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS 12.4(7)'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20080924-multicast',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS 12.4(7)'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20090325-ip',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS 12.4(7)'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20090325-mobileip',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS 12.4(7)'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20090325-webvpn',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS 12.4(7)'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20090826-cucm',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS 12.4(7)'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20090908-tcp24',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS 12.4(7)'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20090923-tunnels',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS 12.4(7)'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20100324-cucme',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS 12.4(7)'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20100324-ldp',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS 12.4(7)'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20100922-sip',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS 12.4(7)'}&lt;/P&gt;
&lt;P&gt;{'id': u'Cisco-SA-20110610-CVE-2011-1631',&amp;nbsp; 'software': u'Cisco IOS 12.4(7)'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20110928-nat',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS 12.4(7)'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20120328-msdp',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS 12.4(7)'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20120328-pai',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS Software 12.4(7)'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20120926-cucm',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS 12.4(7)'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20120926-sip',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS 12.4(7)'}&lt;/P&gt;
&lt;P&gt;{'id': u'Cisco-SA-20130327-CVE-2013-1142',&amp;nbsp; 'software': u'Cisco IOS 12.4(7)'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20130327-nat',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS 12.4(7)'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20130801-lsaospf',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS 12.4(7)'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20130925-ipv6vfr',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS 12.4(7)'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20150325-tcpleak',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS 12.4(7)'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20150408-ntpd',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS 12.4(7)'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20151021-ntp',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS 12.4(7)'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20151120-ns',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS 12.4(7)'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20160127-ntpd',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS 12.4(7)'}&lt;/P&gt;
&lt;P&gt;{'id': u'cisco-sa-20160525-ipv6',&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 'software': u'Cisco IOS 12.4(7)'}&lt;/P&gt;
&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The question: Is Cisco going to normalize this data so I don't have to account for every variation through regex magic?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Sep 2016 18:27:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/services-discussions/massive-data-integrity-issues-why-the-api-is-worthless/m-p/3507370#M161</guid>
      <dc:creator>anthony.t.nelson</dc:creator>
      <dc:date>2016-09-09T18:27:04Z</dc:date>
    </item>
    <item>
      <title>Re: Massive Data Integrity Issues - Why the API is Worthless</title>
      <link>https://community.cisco.com/t5/services-discussions/massive-data-integrity-issues-why-the-api-is-worthless/m-p/3507371#M162</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Anthony,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your feedback. Is this data from the CVRF xml's or from the OVAL definitions?&amp;nbsp; We are aware of issues with the CVRF data around version information. For IOS and IOS XE the best way to retrieve information about the versions is by either using the OVAL definitions via the API or the IOS Software Checker tool. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Sep 2016 22:19:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/services-discussions/massive-data-integrity-issues-why-the-api-is-worthless/m-p/3507371#M162</guid>
      <dc:creator>Omar Santos</dc:creator>
      <dc:date>2016-09-19T22:19:56Z</dc:date>
    </item>
    <item>
      <title>Re: Massive Data Integrity Issues - Why the API is Worthless</title>
      <link>https://community.cisco.com/t5/services-discussions/massive-data-integrity-issues-why-the-api-is-worthless/m-p/3507372#M163</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Omar,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I appreciate the response.&amp;nbsp; However, I'm finding even further discrepancies going that route.&amp;nbsp; Examine Advisory &lt;A href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-dns"&gt;cisco-sa-20160928-dns&lt;/A&gt;, which has an &lt;A href="http://tools.cisco.com/security/center/contentxml/CiscoSecurityAdvisory/cisco-sa-20160928-dns/oval/cisco-sa-20160928-dns_611.xml"&gt;OVAL&lt;/A&gt; and &lt;A href="http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-dns/cvrf/cisco-sa-20160928-dns_cvrf.xml"&gt;CFRV&lt;/A&gt; definition.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The OVAL definition only lists testing against the running config "config ip dns server", but does not have any IOS versions listed.&amp;nbsp; Further, the OVAL definition does not include any of the advisory information that would be helpful for "more information", just a ref_url.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The CVRF includes all of the information you would want about the advisory and all the product names associated (IOS releases).&amp;nbsp; But as you stated, the CVRF OS information does not have strong data integrity.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Finally, in order to piece all of this information together, I have to bounce the API twice as I only receive the XML URL from either OVAL or CVRF.&amp;nbsp; And the /oval/Advisory/{advisory_id} doesn't seem to work all of the time from what I've seen.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Sep 2016 18:54:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/services-discussions/massive-data-integrity-issues-why-the-api-is-worthless/m-p/3507372#M163</guid>
      <dc:creator>anthony.t.nelson</dc:creator>
      <dc:date>2016-09-29T18:54:19Z</dc:date>
    </item>
    <item>
      <title>Re: Massive Data Integrity Issues - Why the API is Worthless</title>
      <link>https://community.cisco.com/t5/services-discussions/massive-data-integrity-issues-why-the-api-is-worthless/m-p/3507373#M164</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Anthony,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for the heads up on this! Can you please check the &lt;A href="https://tools.cisco.com/security/center/ovalListing.x"&gt;OVAL definitions&lt;/A&gt; and please let me know if you encounter any problems. It appears that there was a synchronization problem; however, I have just checked them all and they do have the version information. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Oct 2016 01:29:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/services-discussions/massive-data-integrity-issues-why-the-api-is-worthless/m-p/3507373#M164</guid>
      <dc:creator>Omar Santos</dc:creator>
      <dc:date>2016-10-04T01:29:29Z</dc:date>
    </item>
    <item>
      <title>Re: Massive Data Integrity Issues - Why the API is Worthless</title>
      <link>https://community.cisco.com/t5/services-discussions/massive-data-integrity-issues-why-the-api-is-worthless/m-p/3507374#M165</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just looked and the OVAL XML was updated for the few I checked last week and now includes IOS versions.&amp;nbsp; Thank you for the update.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm likely going to build something against OVAL, but I'll still need to account for ASA's and other Cisco gear elsewhere.&amp;nbsp; I like that the OVAL definition does include actual tests both code and by service selection.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Oct 2016 14:48:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/services-discussions/massive-data-integrity-issues-why-the-api-is-worthless/m-p/3507374#M165</guid>
      <dc:creator>anthony.t.nelson</dc:creator>
      <dc:date>2016-10-05T14:48:21Z</dc:date>
    </item>
    <item>
      <title>Re: Massive Data Integrity Issues - Why the API is Worthless</title>
      <link>https://community.cisco.com/t5/services-discussions/massive-data-integrity-issues-why-the-api-is-worthless/m-p/3507375#M166</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Anthony,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where did you get the 'software' key? I cannot see it in return results from &lt;A href="https://api.cisco.com/security/advisories/cvrf/all" title="https://api.cisco.com/security/advisories/cvrf/all"&gt;https://api.cisco.com/security/advisories/cvrf/all&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 31 Oct 2016 14:13:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/services-discussions/massive-data-integrity-issues-why-the-api-is-worthless/m-p/3507375#M166</guid>
      <dc:creator>Andrei Batyrov</dc:creator>
      <dc:date>2016-10-31T14:13:28Z</dc:date>
    </item>
    <item>
      <title>Re: Massive Data Integrity Issues - Why the API is Worthless</title>
      <link>https://community.cisco.com/t5/services-discussions/massive-data-integrity-issues-why-the-api-is-worthless/m-p/3507376#M167</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Omar,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i also tried the API, works pretty well but i have the same problem, the detailed XML does not contain all affected IOS versions, for example cisco-sa-20160419-ios.xml (&amp;nbsp; CVE-2016-1384), the Bug tool shows much more.&lt;/P&gt;&lt;P&gt;Will CVRF show all someday or is it better to use OVAL at all ?&lt;/P&gt;&lt;P&gt;I started with CVRF because it looked more simple to decode to me.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Nov 2016 09:20:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/services-discussions/massive-data-integrity-issues-why-the-api-is-worthless/m-p/3507376#M167</guid>
      <dc:creator>klohse</dc:creator>
      <dc:date>2016-11-03T09:20:33Z</dc:date>
    </item>
    <item>
      <title>Re: Massive Data Integrity Issues - Why the API is Worthless</title>
      <link>https://community.cisco.com/t5/services-discussions/massive-data-integrity-issues-why-the-api-is-worthless/m-p/3507377#M168</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are limitations with CVRF and as a matter of fact, we are standing a new TC in OASIS to enhance CVRF (standard):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;https://www.oasis-open.org/committees/tc_home.php?wg_abbrev=csaf&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;which is why we are recommending OVAL for that type of evaluation. On the other hand, I have better news... we are expanding the API very soon (within the next two months) to support IOS software checker. You will be able to submit an IOS or IOS-XE version and get all advisories that affect such version, along with the first fixed version information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Omar Santos&lt;/P&gt;&lt;P&gt;PSIRT, Security Research and Operations&lt;/P&gt;&lt;P&gt;Cisco Systems, Inc.&lt;/P&gt;&lt;P&gt;Email: os@cisco.com&amp;lt;mailto:os@cisco.com&amp;gt;&lt;/P&gt;&lt;P&gt;Phone: &lt;EM&gt;1 919 392 8635&amp;lt;tel:&lt;/EM&gt;1%20919%20392%208635&amp;gt;&lt;/P&gt;&lt;P&gt;PGP Key: 0x3AF27EDC&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Nov 2016 15:36:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/services-discussions/massive-data-integrity-issues-why-the-api-is-worthless/m-p/3507377#M168</guid>
      <dc:creator>Omar Santos</dc:creator>
      <dc:date>2016-11-03T15:36:39Z</dc:date>
    </item>
    <item>
      <title>Re: Massive Data Integrity Issues - Why the API is Worthless</title>
      <link>https://community.cisco.com/t5/services-discussions/massive-data-integrity-issues-why-the-api-is-worthless/m-p/3507378#M169</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Omar,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Good news regarding the Software Checker. By the way, do you know if they have plans to start supporting other OSes as well, like IOS-XR and NX-OS?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Nov 2016 01:44:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/services-discussions/massive-data-integrity-issues-why-the-api-is-worthless/m-p/3507378#M169</guid>
      <dc:creator>Andrei Batyrov</dc:creator>
      <dc:date>2016-11-04T01:44:24Z</dc:date>
    </item>
    <item>
      <title>Re: Massive Data Integrity Issues - Why the API is Worthless</title>
      <link>https://community.cisco.com/t5/services-discussions/massive-data-integrity-issues-why-the-api-is-worthless/m-p/3507379#M170</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Andrei,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco is starting to scope this for NXOS, but I don't have an ETA yet.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Nov 2016 06:07:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/services-discussions/massive-data-integrity-issues-why-the-api-is-worthless/m-p/3507379#M170</guid>
      <dc:creator>Omar Santos</dc:creator>
      <dc:date>2016-11-04T06:07:02Z</dc:date>
    </item>
    <item>
      <title>Re: Massive Data Integrity Issues - Why the API is Worthless</title>
      <link>https://community.cisco.com/t5/services-discussions/massive-data-integrity-issues-why-the-api-is-worthless/m-p/3507380#M171</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sounds great, thanks for the update!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Nov 2016 06:10:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/services-discussions/massive-data-integrity-issues-why-the-api-is-worthless/m-p/3507380#M171</guid>
      <dc:creator>Andrei Batyrov</dc:creator>
      <dc:date>2016-11-04T06:10:00Z</dc:date>
    </item>
    <item>
      <title>Re: Massive Data Integrity Issues - Why the API is Worthless</title>
      <link>https://community.cisco.com/t5/services-discussions/massive-data-integrity-issues-why-the-api-is-worthless/m-p/3507381#M172</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Omar,&lt;/P&gt;&lt;P&gt;hmmm, i am wondering why CVRF is the Problem here, only more lines with product IDs need to be added.&lt;/P&gt;&lt;P&gt;My script does not care if there are 10 or 30 XML tags with product IDs, i don't see in the Standard that there is a limitation.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Nov 2016 09:07:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/services-discussions/massive-data-integrity-issues-why-the-api-is-worthless/m-p/3507381#M172</guid>
      <dc:creator>klohse</dc:creator>
      <dc:date>2016-11-07T09:07:00Z</dc:date>
    </item>
    <item>
      <title>Re: Massive Data Integrity Issues - Why the API is Worthless</title>
      <link>https://community.cisco.com/t5/services-discussions/massive-data-integrity-issues-why-the-api-is-worthless/m-p/3507382#M173</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Omar,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;just found another problem, the Version history is not up to date in the CVRF XML file, API said update on Nov 2 to V1.2 but when downloading the detail XML still Shows 1.1 as the latest release.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-&amp;lt;DocumentTracking&amp;gt;&lt;/P&gt;&lt;P&gt;-&amp;lt;Identification&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;ID&amp;gt;cisco-sa-20161026-linux&amp;lt;/ID&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;/Identification&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;Status&amp;gt;Interim&amp;lt;/Status&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;Version&amp;gt;1.1&amp;lt;/Version&amp;gt;&lt;/P&gt;&lt;P&gt;-&amp;lt;RevisionHistory&amp;gt;&lt;/P&gt;&lt;P&gt;-&amp;lt;Revision&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;Number&amp;gt;1.0&amp;lt;/Number&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;Date&amp;gt;2016-10-26T14:57:38&amp;lt;/Date&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;Description&amp;gt;Initial public release.&amp;lt;/Description&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;/Revision&amp;gt;&lt;/P&gt;&lt;P&gt;-&amp;lt;Revision&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;Number&amp;gt;1.1&amp;lt;/Number&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;Date&amp;gt;2016-10-28T13:55:09&amp;lt;/Date&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;Description&amp;gt;Updated the investigated products as Vulnerable or Not Vulnerable.&amp;lt;/Description&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;/Revision&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;/RevisionHistory&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;InitialReleaseDate&amp;gt;2016-10-26T15:00:00&amp;lt;/InitialReleaseDate&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;CurrentReleaseDate&amp;gt;2016-10-28T13:55:09&amp;lt;/CurrentReleaseDate&amp;gt;&lt;/P&gt;&lt;P&gt;-&amp;lt;Generator&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;Engine&amp;gt;TVCE&amp;lt;/Engine&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;/Generator&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;/DocumentTracking&amp;gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Nov 2016 10:25:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/services-discussions/massive-data-integrity-issues-why-the-api-is-worthless/m-p/3507382#M173</guid>
      <dc:creator>klohse</dc:creator>
      <dc:date>2016-11-08T10:25:05Z</dc:date>
    </item>
    <item>
      <title>Re: Massive Data Integrity Issues - Why the API is Worthless</title>
      <link>https://community.cisco.com/t5/services-discussions/massive-data-integrity-issues-why-the-api-is-worthless/m-p/3507383#M174</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi klohse,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I checked this myself and also with our development team that support the API, as well as the team that supports the creation of the CVRF file. We cannot reproduce that issue (testing with the advisory you mention below and with several others).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Currently, the version of the advisory is 1.3:&lt;/P&gt;&lt;P&gt;&lt;A href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-linux" title="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-linux"&gt;https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-linux&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CVRF file: &lt;A href="http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-linux/cvrf/cisco-sa-20161026-linux_cvrf.xml" title="http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-linux/cvrf/cisco-sa-20161026-linux_cvrf.xml"&gt;http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-linux/cvrf/cisco-sa-20161026-linu…&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN class="s2"&gt;&amp;lt;DocumentTracking&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN class="s2"&gt;&amp;lt;Identification&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s2"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN class="s3"&gt;&amp;lt;ID&amp;gt;&lt;/SPAN&gt;&lt;SPAN class="s2"&gt;cisco-sa-20161026-linux&lt;/SPAN&gt;&lt;SPAN class="s3"&gt;&amp;lt;/ID&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN class="s2"&gt;&amp;lt;/Identification&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN class="s2"&gt;&amp;lt;Status&amp;gt;&lt;/SPAN&gt;&lt;SPAN class="s1"&gt;Interim&lt;/SPAN&gt;&lt;SPAN class="s2"&gt;&amp;lt;/Status&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN class="s2"&gt;&amp;lt;Version&amp;gt;&lt;/SPAN&gt;&lt;SPAN class="s1"&gt;1.3&lt;/SPAN&gt;&lt;SPAN class="s2"&gt;&amp;lt;/Version&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN class="s2"&gt;&amp;lt;RevisionHistory&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN class="s2"&gt;&amp;lt;Revision&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN class="s2"&gt;&amp;lt;Number&amp;gt;&lt;/SPAN&gt;&lt;SPAN class="s1"&gt;1.0&lt;/SPAN&gt;&lt;SPAN class="s2"&gt;&amp;lt;/Number&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s2"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN class="s3"&gt;&amp;lt;Date&amp;gt;&lt;/SPAN&gt;&lt;SPAN class="s2"&gt;2016-10-26T14:57:38&lt;/SPAN&gt;&lt;SPAN class="s3"&gt;&amp;lt;/Date&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s2"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN class="s3"&gt;&amp;lt;Description&amp;gt;&lt;/SPAN&gt;&lt;SPAN class="s2"&gt;Initial public release.&lt;/SPAN&gt;&lt;SPAN class="s3"&gt;&amp;lt;/Description&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN class="s2"&gt;&amp;lt;/Revision&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN class="s2"&gt;&amp;lt;Revision&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN class="s2"&gt;&amp;lt;Number&amp;gt;&lt;/SPAN&gt;&lt;SPAN class="s1"&gt;1.1&lt;/SPAN&gt;&lt;SPAN class="s2"&gt;&amp;lt;/Number&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s2"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN class="s3"&gt;&amp;lt;Date&amp;gt;&lt;/SPAN&gt;&lt;SPAN class="s2"&gt;2016-10-28T13:55:09&lt;/SPAN&gt;&lt;SPAN class="s3"&gt;&amp;lt;/Date&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s2"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN class="s3"&gt;&amp;lt;Description&amp;gt;&lt;/SPAN&gt;&lt;SPAN class="s2"&gt;Updated the investigated products as Vulnerable or Not Vulnerable.&lt;/SPAN&gt;&lt;SPAN class="s3"&gt;&amp;lt;/Description&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN class="s2"&gt;&amp;lt;/Revision&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN class="s2"&gt;&amp;lt;Revision&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN class="s2"&gt;&amp;lt;Number&amp;gt;&lt;/SPAN&gt;&lt;SPAN class="s1"&gt;1.2&lt;/SPAN&gt;&lt;SPAN class="s2"&gt;&amp;lt;/Number&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s2"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN class="s3"&gt;&amp;lt;Date&amp;gt;&lt;/SPAN&gt;&lt;SPAN class="s2"&gt;2016-11-02T16:12:29&lt;/SPAN&gt;&lt;SPAN class="s3"&gt;&amp;lt;/Date&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s2"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN class="s3"&gt;&amp;lt;Description&amp;gt;&lt;/SPAN&gt;&lt;SPAN class="s2"&gt;Updated the investigated products as Vulnerable or Not Vulnerable.&lt;/SPAN&gt;&lt;SPAN class="s3"&gt;&amp;lt;/Description&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN class="s2"&gt;&amp;lt;/Revision&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN class="s2"&gt;&amp;lt;Revision&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN class="s2"&gt;&amp;lt;Number&amp;gt;&lt;/SPAN&gt;&lt;SPAN class="s1"&gt;1.3&lt;/SPAN&gt;&lt;SPAN class="s2"&gt;&amp;lt;/Number&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s2"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN class="s3"&gt;&amp;lt;Date&amp;gt;&lt;/SPAN&gt;&lt;SPAN class="s2"&gt;2016-11-08T14:28:14&lt;/SPAN&gt;&lt;SPAN class="s3"&gt;&amp;lt;/Date&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&lt;SPAN class="s2"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN class="s3"&gt;&amp;lt;Description&amp;gt;&lt;/SPAN&gt;&lt;SPAN class="s2"&gt;Updated the investigated products as Vulnerable or Not Vulnerable&lt;/SPAN&gt;&lt;SPAN class="s3"&gt;&amp;lt;/Description&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN class="s2"&gt;&amp;lt;/Revision&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN class="s2"&gt;&amp;lt;/RevisionHistory&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN class="s2"&gt;&amp;lt;InitialReleaseDate&amp;gt;&lt;/SPAN&gt;&lt;SPAN class="s1"&gt;2016-10-26T15:00:00&lt;/SPAN&gt;&lt;SPAN class="s2"&gt;&amp;lt;/InitialReleaseDate&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN class="s2"&gt;&amp;lt;CurrentReleaseDate&amp;gt;&lt;/SPAN&gt;&lt;SPAN class="s1"&gt;2016-11-08T14:28:14&lt;/SPAN&gt;&lt;SPAN class="s2"&gt;&amp;lt;/CurrentReleaseDate&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN class="s2"&gt;&amp;lt;Generator&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OUTPUT from openVuln API:&lt;/P&gt;&lt;P&gt;bash-3.2$ openVulnQuery --cvrf --advisory cisco-sa-20161026-linux --json test.json&lt;/P&gt;&lt;P&gt;bash-3.2$ cat test.json&lt;/P&gt;&lt;P&gt;[&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; {&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "advisory_id": "cisco-sa-20161026-linux",&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "cves": [&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "CVE-2016-5195"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ],&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "cvrf_url": "&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/security/center/contentxml/CiscoSecurityAdvisory/cisco-sa-20161026-linux/cvrf/cisco-sa-20161026-linux_cvrf.xml" rel="nofollow" target="_blank"&gt;https://tools.cisco.com/security/center/contentxml/CiscoSecurityAdvisory/cisco-sa-20161026-linux/cvrf/cisco-sa-20161026-linux_cvrf.xml&lt;/A&gt;&lt;SPAN&gt;",&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "first_published": "2016-10-26T20:00:00+0000",&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "last_updated": "2016-11-08T20:28:14+0000",&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "sir": "Medium"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;/P&gt;&lt;P&gt;]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All three appear to be in sync. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Nov 2016 23:14:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/services-discussions/massive-data-integrity-issues-why-the-api-is-worthless/m-p/3507383#M174</guid>
      <dc:creator>Omar Santos</dc:creator>
      <dc:date>2016-11-08T23:14:13Z</dc:date>
    </item>
    <item>
      <title>Re: Massive Data Integrity Issues - Why the API is Worthless</title>
      <link>https://community.cisco.com/t5/services-discussions/massive-data-integrity-issues-why-the-api-is-worthless/m-p/3507384#M175</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Omar,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;yes, pretty strange, i just ran an update (Nov 9 6:48AM CET) and now it is correct.&lt;/P&gt;&lt;P&gt;I swear i ran the same Software on Nov 7 8:36AM CET and there was only V1.1 in the XML because API said there was no update, so my tool did not download the update.&lt;/P&gt;&lt;P&gt;The XML tag "last updated" said 2016-11-02T21:12:29+0000&lt;/P&gt;&lt;P&gt;However, i will now try OVAL to decide what we will use in the future...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind regards,&lt;/P&gt;&lt;P&gt;Kai Lohse&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Nov 2016 05:58:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/services-discussions/massive-data-integrity-issues-why-the-api-is-worthless/m-p/3507384#M175</guid>
      <dc:creator>klohse</dc:creator>
      <dc:date>2016-11-09T05:58:12Z</dc:date>
    </item>
  </channel>
</rss>

