<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Query Vulnerabilities given a product name in Services Discussions</title>
    <link>https://community.cisco.com/t5/services-discussions/query-vulnerabilities-given-a-product-name/m-p/3525962#M192</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; I have find a question&amp;nbsp; when&amp;nbsp; i use the url&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'Source Code Pro Regular'; font-size: 13px;"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://api.cisco.com/security/advisories/cvrf/product?product" rel="nofollow" target="_blank"&gt;https://api.cisco.com/security/advisories/cvrf/product?product&lt;/A&gt;&lt;SPAN&gt;&amp;lt;&amp;lt;keyword&amp;gt;&amp;gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'Source Code Pro Regular'; font-size: 13px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-size: 12px; font-family: arial;"&gt;For example, i wand to query ISE Vulnerabilities , i use the curl &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-size: 12px; font-family: arial;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-size: 12px; font-family: arial;"&gt;&lt;SPAN&gt;curl -X GET -s -k -H "Accept: application/xml" -H "Authorization: Bearer v2wESFSSPRjvKtkMnsTtS946CNEB" &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://api.cisco.com/security/advisories/cvrf/product?product=" rel="nofollow" target="_blank"&gt;https://api.cisco.com/security/advisories/cvrf/product?product=&lt;/A&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 13.3333px;"&gt;Cisco Identity Services Engine&lt;/SPAN&gt;&amp;nbsp; &amp;gt; G:\0420.xml&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-size: 12px; font-family: arial;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-size: 12px; font-family: arial;"&gt;the output of &lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;Vulnerabilities is same to i use the below curl&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-size: 12px; font-family: arial;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-size: 12px; font-family: arial;"&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;&lt;SPAN&gt;curl -X GET -s -k -H "Accept: application/xml" -H "Authorization: Bearer v2wESFSSPRjvKtkMnsTtS946CNEB" &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://api.cisco.com/security/advisories/cvrf/product?product=" rel="nofollow" target="_blank"&gt;https://api.cisco.com/security/advisories/cvrf/product?product=&lt;/A&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 13.3333px;"&gt;Cisco&lt;/SPAN&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt; &amp;gt; G:\0420.xml&lt;/SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;H1 style="font-size: 26px; font-family: arial; color: #0a63a7;"&gt;&lt;/H1&gt;&lt;P&gt;1,so i doubt that whether only the first keyword is useful when &lt;SPAN style="font-size: 13.3333px;"&gt;querying the PSIRT openVuln API by Product ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;2, how to query &lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 13.3333px;"&gt;Cisco Identity Services Engine by&amp;nbsp; curl methods ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 13.3333px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 13.3333px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 13.3333px;"&gt;thanks a lot&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;shanxiong&lt;/P&gt;&lt;H1 style="font-size: 26px; font-family: arial; color: #0a63a7;"&gt;&lt;/H1&gt;&lt;P&gt;&lt;/P&gt;&lt;H1 style="font-size: 26px; font-family: arial; color: #0a63a7;"&gt;&lt;/H1&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 19 Apr 2018 02:37:48 GMT</pubDate>
    <dc:creator>shanxiong</dc:creator>
    <dc:date>2018-04-19T02:37:48Z</dc:date>
    <item>
      <title>Query Vulnerabilities given a product name</title>
      <link>https://community.cisco.com/t5/services-discussions/query-vulnerabilities-given-a-product-name/m-p/3525962#M192</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; I have find a question&amp;nbsp; when&amp;nbsp; i use the url&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'Source Code Pro Regular'; font-size: 13px;"&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://api.cisco.com/security/advisories/cvrf/product?product" rel="nofollow" target="_blank"&gt;https://api.cisco.com/security/advisories/cvrf/product?product&lt;/A&gt;&lt;SPAN&gt;&amp;lt;&amp;lt;keyword&amp;gt;&amp;gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'Source Code Pro Regular'; font-size: 13px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-size: 12px; font-family: arial;"&gt;For example, i wand to query ISE Vulnerabilities , i use the curl &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-size: 12px; font-family: arial;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-size: 12px; font-family: arial;"&gt;&lt;SPAN&gt;curl -X GET -s -k -H "Accept: application/xml" -H "Authorization: Bearer v2wESFSSPRjvKtkMnsTtS946CNEB" &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://api.cisco.com/security/advisories/cvrf/product?product=" rel="nofollow" target="_blank"&gt;https://api.cisco.com/security/advisories/cvrf/product?product=&lt;/A&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 13.3333px;"&gt;Cisco Identity Services Engine&lt;/SPAN&gt;&amp;nbsp; &amp;gt; G:\0420.xml&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-size: 12px; font-family: arial;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-size: 12px; font-family: arial;"&gt;the output of &lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;Vulnerabilities is same to i use the below curl&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-size: 12px; font-family: arial;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-size: 12px; font-family: arial;"&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;&lt;SPAN&gt;curl -X GET -s -k -H "Accept: application/xml" -H "Authorization: Bearer v2wESFSSPRjvKtkMnsTtS946CNEB" &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://api.cisco.com/security/advisories/cvrf/product?product=" rel="nofollow" target="_blank"&gt;https://api.cisco.com/security/advisories/cvrf/product?product=&lt;/A&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 13.3333px;"&gt;Cisco&lt;/SPAN&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt; &amp;gt; G:\0420.xml&lt;/SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;H1 style="font-size: 26px; font-family: arial; color: #0a63a7;"&gt;&lt;/H1&gt;&lt;P&gt;1,so i doubt that whether only the first keyword is useful when &lt;SPAN style="font-size: 13.3333px;"&gt;querying the PSIRT openVuln API by Product ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;2, how to query &lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 13.3333px;"&gt;Cisco Identity Services Engine by&amp;nbsp; curl methods ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 13.3333px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 13.3333px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 13.3333px;"&gt;thanks a lot&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;shanxiong&lt;/P&gt;&lt;H1 style="font-size: 26px; font-family: arial; color: #0a63a7;"&gt;&lt;/H1&gt;&lt;P&gt;&lt;/P&gt;&lt;H1 style="font-size: 26px; font-family: arial; color: #0a63a7;"&gt;&lt;/H1&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Apr 2018 02:37:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/services-discussions/query-vulnerabilities-given-a-product-name/m-p/3525962#M192</guid>
      <dc:creator>shanxiong</dc:creator>
      <dc:date>2018-04-19T02:37:48Z</dc:date>
    </item>
    <item>
      <title>Re: Query Vulnerabilities given a product name</title>
      <link>https://community.cisco.com/t5/services-discussions/query-vulnerabilities-given-a-product-name/m-p/3525963#M193</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't have an API key handy to test, but I think this is what you are looking for:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;curl -X GET -G -s -k -H "Accept: application/xml" -H "Authorization: Bearer v2wESFSSPRjvKtkMnsTtS946CNEB" &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://api.cisco.com/security/advisories/cvrf/product" rel="nofollow" target="_blank"&gt;https://api.cisco.com/security/advisories/cvrf/product&lt;/A&gt;&lt;SPAN&gt; --data-urlencode "product=Cisco Identity Services Engine" &amp;gt; test1.txt&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or, you could manually substitute "%20" for each space, but I think above is more graceful. If you want to confirm, throw a "-v" in and you can see the url being requested. With above I see:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; GET /security/advisories/cvrf/product?product=Cisco%20Identity%20Services%20Engine HTTP/1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Eric&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Apr 2018 16:57:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/services-discussions/query-vulnerabilities-given-a-product-name/m-p/3525963#M193</guid>
      <dc:creator>erthiel</dc:creator>
      <dc:date>2018-04-19T16:57:55Z</dc:date>
    </item>
    <item>
      <title>Re: Query Vulnerabilities given a product name</title>
      <link>https://community.cisco.com/t5/services-discussions/query-vulnerabilities-given-a-product-name/m-p/3525964#M194</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Eric&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you for your kindly help &lt;/P&gt;&lt;P&gt;I have do test&amp;nbsp; about the two methods,, both ok.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;shanxiong&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Apr 2018 05:46:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/services-discussions/query-vulnerabilities-given-a-product-name/m-p/3525964#M194</guid>
      <dc:creator>shanxiong</dc:creator>
      <dc:date>2018-04-23T05:46:15Z</dc:date>
    </item>
  </channel>
</rss>

