<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic openVulnQuery - Query ISE Vulnerabilities in Services Discussions</title>
    <link>https://community.cisco.com/t5/services-discussions/openvulnquery-query-ise-vulnerabilities/m-p/3527404#M195</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am wanting to use openVulnQuery to return all Cisco ISE Vulnerabilities. If I can filter on specific versions - even better. I am using Python 3.6 to run my query. Does openVulnQuery support using ISE as the product name? I want to avoid generating a report that pulls the entire database and filters on "Cisco Identity Services Engine". Any help would be greatly appreciated. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am following these links as a point of reference for the output:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://www.cisco.com/c/en/us/support/security/identity-services-engine/products-security-advisories-list.html" rel="nofollow" target="_blank"&gt;https://www.cisco.com/c/en/us/support/security/identity-services-engine/products-security-advisories-list.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/security/center/publicationListing.x?resourceIDs=111903&amp;amp;apply=1,0&amp;amp;totalbox=2&amp;amp;pt0=Cisco&amp;amp;cp0=111903&amp;amp;limit=100#~FilterByProduct" rel="nofollow" target="_blank"&gt;https://tools.cisco.com/security/center/publicationListing.x?resourceIDs=111903&amp;amp;apply=1,0&amp;amp;totalbox=2&amp;amp;pt0=Cisco&amp;amp;cp0=111903&amp;amp;limit=100#~FilterByProduct&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Python Script:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;from openVulnQuery import query_client&lt;/P&gt;&lt;P&gt;query_client = query_client.OpenVulnQueryClient(client_id="", client_secret="")&lt;/P&gt;&lt;P&gt;test = query_client.get_by_product(adv_format="oval", product_name="identity-services-engine")&lt;/P&gt;&lt;P&gt;print(test)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 09 Apr 2018 17:17:12 GMT</pubDate>
    <dc:creator>tjbuehrer</dc:creator>
    <dc:date>2018-04-09T17:17:12Z</dc:date>
    <item>
      <title>openVulnQuery - Query ISE Vulnerabilities</title>
      <link>https://community.cisco.com/t5/services-discussions/openvulnquery-query-ise-vulnerabilities/m-p/3527404#M195</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am wanting to use openVulnQuery to return all Cisco ISE Vulnerabilities. If I can filter on specific versions - even better. I am using Python 3.6 to run my query. Does openVulnQuery support using ISE as the product name? I want to avoid generating a report that pulls the entire database and filters on "Cisco Identity Services Engine". Any help would be greatly appreciated. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am following these links as a point of reference for the output:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://www.cisco.com/c/en/us/support/security/identity-services-engine/products-security-advisories-list.html" rel="nofollow" target="_blank"&gt;https://www.cisco.com/c/en/us/support/security/identity-services-engine/products-security-advisories-list.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/security/center/publicationListing.x?resourceIDs=111903&amp;amp;apply=1,0&amp;amp;totalbox=2&amp;amp;pt0=Cisco&amp;amp;cp0=111903&amp;amp;limit=100#~FilterByProduct" rel="nofollow" target="_blank"&gt;https://tools.cisco.com/security/center/publicationListing.x?resourceIDs=111903&amp;amp;apply=1,0&amp;amp;totalbox=2&amp;amp;pt0=Cisco&amp;amp;cp0=111903&amp;amp;limit=100#~FilterByProduct&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Python Script:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;from openVulnQuery import query_client&lt;/P&gt;&lt;P&gt;query_client = query_client.OpenVulnQueryClient(client_id="", client_secret="")&lt;/P&gt;&lt;P&gt;test = query_client.get_by_product(adv_format="oval", product_name="identity-services-engine")&lt;/P&gt;&lt;P&gt;print(test)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Apr 2018 17:17:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/services-discussions/openvulnquery-query-ise-vulnerabilities/m-p/3527404#M195</guid>
      <dc:creator>tjbuehrer</dc:creator>
      <dc:date>2018-04-09T17:17:12Z</dc:date>
    </item>
    <item>
      <title>Re: openVulnQuery - Query ISE Vulnerabilities</title>
      <link>https://community.cisco.com/t5/services-discussions/openvulnquery-query-ise-vulnerabilities/m-p/3527405#M196</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Timothy,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Querying by version is only supported for IOS and IOS-XE.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;Omar&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Apr 2018 17:28:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/services-discussions/openvulnquery-query-ise-vulnerabilities/m-p/3527405#M196</guid>
      <dc:creator>Omar Santos</dc:creator>
      <dc:date>2018-04-09T17:28:16Z</dc:date>
    </item>
    <item>
      <title>Re: openVulnQuery - Query ISE Vulnerabilities</title>
      <link>https://community.cisco.com/t5/services-discussions/openvulnquery-query-ise-vulnerabilities/m-p/3527406#M197</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="font-size: 13.3333px;"&gt;Hi Omar,&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;That's too bad. I don't mind not being able to query by version. I'd like to be able to query all Cisco ISE vulnerabilities as a product ID. If there isn't a specific URL to query on could I submit a feature request? &lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;Examples:&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;&lt;A href="https://api.cisco.com/security/advisories/all/product?product=identity-services-engine" title="https://api.cisco.com/security/advisories/all/product?product=identity-services-engine"&gt;https://api.cisco.com/security/advisories/all/product?product=identity-services-engine&lt;/A&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;or &lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;&lt;A href="https://api.cisco.com/security/advisories/all/product?product=ise" title="https://api.cisco.com/security/advisories/all/product?product=ise"&gt;https://api.cisco.com/security/advisories/all/product?product=ise&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Apr 2018 18:49:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/services-discussions/openvulnquery-query-ise-vulnerabilities/m-p/3527406#M197</guid>
      <dc:creator>tjbuehrer</dc:creator>
      <dc:date>2018-04-09T18:49:18Z</dc:date>
    </item>
    <item>
      <title>Re: openVulnQuery - Query ISE Vulnerabilities</title>
      <link>https://community.cisco.com/t5/services-discussions/openvulnquery-query-ise-vulnerabilities/m-p/3527407#M198</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Timothy,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes indeed. You can do it using &lt;SPAN style="font-size: 13.3333px;"&gt; "Cisco Identity Services Engine". The following is an example using the openVulnQuery client:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;TABLE border="1"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;
&lt;P&gt;openVulnQuery --cvrf --product "Cisco Identity Services Engine"&lt;/P&gt;
&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BLOCKQUOTE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Apr 2018 18:55:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/services-discussions/openvulnquery-query-ise-vulnerabilities/m-p/3527407#M198</guid>
      <dc:creator>Omar Santos</dc:creator>
      <dc:date>2018-04-09T18:55:07Z</dc:date>
    </item>
    <item>
      <title>Re: openVulnQuery - Query ISE Vulnerabilities</title>
      <link>https://community.cisco.com/t5/services-discussions/openvulnquery-query-ise-vulnerabilities/m-p/3527408#M199</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That worked perfectly. Thank you for your assistance. I didn't think the product name would accept values with spaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's the query I used for reference:&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;TABLE border="1"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;
&lt;P&gt;test = query_client.get_by_product(adv_format="cvrf", product_name="Cisco Identity Services Engine")&lt;/P&gt;

&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BLOCKQUOTE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Apr 2018 20:48:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/services-discussions/openvulnquery-query-ise-vulnerabilities/m-p/3527408#M199</guid>
      <dc:creator>tjbuehrer</dc:creator>
      <dc:date>2018-04-09T20:48:57Z</dc:date>
    </item>
  </channel>
</rss>

