<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Python openVulnQuery Client in Services Discussions</title>
    <link>https://community.cisco.com/t5/services-discussions/python-openvulnquery-client/m-p/3562340#M225</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; We have a new tool to query and interact with the the &lt;A class="jive-link-external-small" href="https://developer.cisco.com/site/PSIRT/" rel="nofollow" style="font-weight: inherit; font-style: inherit; font-family: inherit; color: #0a63a7;" target="_blank"&gt;Cisco PSIRT openVuln API&lt;/A&gt; called &lt;A class="jive-link-external-small" href="https://github.com/CiscoPSIRT/openVulnAPI" rel="nofollow" style="font-weight: inherit; font-style: inherit; font-family: inherit; color: #0a63a7;" target="_blank"&gt;openVulnQuery&lt;/A&gt;.&amp;nbsp; They have published and released the code of this Python based module in the&lt;A class="jive-link-external-small" href="https://github.com/CiscoPSIRT/openVulnAPI" rel="nofollow" style="font-weight: inherit; font-style: inherit; font-family: inherit; color: #0a63a7;" target="_blank"&gt; Cisco PSIRT github repository&lt;/A&gt;. This module allows users to query the openVuln API using the command line and retrieve additional fields out of CVRF (version 1.1) XML documents. With our custom XML parser they were able to take advantage of including new fields and eliminated the need to use the &lt;A class="jive-link-external-small" href="http://blogs.cisco.com/security/tools-of-the-trade-cvrfparse" rel="nofollow" style="font-weight: inherit; font-style: inherit; font-family: inherit; color: #0a63a7;" target="_blank"&gt;cvrfparser&lt;/A&gt; framework.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The following are examples of the new fields included:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Cisco bug IDs&lt;/LI&gt;&lt;/UL&gt;&lt;UL&gt;&lt;LI&gt;extensive vulnerability information&lt;/LI&gt;&lt;/UL&gt;&lt;UL&gt;&lt;LI&gt;full product list&lt;/LI&gt;&lt;/UL&gt;&lt;UL&gt;&lt;LI&gt;vulnerability summary&lt;/LI&gt;&lt;/UL&gt;&lt;UL&gt;&lt;LI&gt;document title&lt;/LI&gt;&lt;/UL&gt;&lt;UL&gt;&lt;LI&gt;publication URL&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Since the code is open source, you can also add the capability to add any other fields from the CVRF file.&amp;nbsp; There is even an option to save an API data call to a CSV or JSON file or display it out to the screen in a neat table.&lt;BR /&gt;&lt;SPAN data-node-type="line" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN data-node-type="line" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;&lt;A class="jive-link-external-small" href="https://github.com/CiscoPSIRT/openVulnAPI" rel="nofollow" style="font-weight: inherit; font-style: inherit; font-family: inherit; color: #0a63a7;" target="_blank"&gt;openVulnQuery&lt;/A&gt;&lt;/SPAN&gt;&lt;SPAN data-node-type="line" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt; is also a library with importable modules. User can import query_client module to initialize a client with appropriate credentials and perform queries on the &lt;A class="jive-link-external-small" href="https://developer.cisco.com/site/PSIRT/" rel="nofollow" style="font-weight: inherit; font-style: inherit; font-family: inherit; color: #0a63a7;" target="_blank"&gt;Cisco PSIRT openVuln API&lt;/A&gt;. &lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN data-node-type="line" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN data-node-type="line" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;The code is available in the&lt;A class="jive-link-external-small" href="https://github.com/CiscoPSIRT/openVulnAPI" rel="nofollow" style="font-weight: inherit; font-style: inherit; font-family: inherit; color: #0a63a7;" target="_blank"&gt; Cisco PSIRT github repository&lt;/A&gt; and the tool can also be installed using the Python Package Index (PyPI).&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN data-node-type="line" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-family: terminal, monaco;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; pip install openVulnQuery&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step-by-step examples and additional documentation can be found at the &lt;A class="jive-link-external-small" href="https://github.com/CiscoPSIRT/openVulnAPI/blob/master/openVulnQuery/README.md" rel="nofollow" style="font-weight: inherit; font-style: inherit; font-family: inherit; color: #0a63a7;" target="_blank"&gt;README.md &lt;/A&gt;file at the&lt;A class="jive-link-external-small" href="https://github.com/CiscoPSIRT/openVulnAPI" rel="nofollow" style="font-weight: inherit; font-style: inherit; font-family: inherit; color: #0a63a7;" target="_blank"&gt; Cisco PSIRT github repository&lt;/A&gt;. Please feel free to contribute to this tool and send us your comments.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 14 Oct 2016 20:31:36 GMT</pubDate>
    <dc:creator>Omar Santos</dc:creator>
    <dc:date>2016-10-14T20:31:36Z</dc:date>
    <item>
      <title>Python openVulnQuery Client</title>
      <link>https://community.cisco.com/t5/services-discussions/python-openvulnquery-client/m-p/3562340#M225</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; We have a new tool to query and interact with the the &lt;A class="jive-link-external-small" href="https://developer.cisco.com/site/PSIRT/" rel="nofollow" style="font-weight: inherit; font-style: inherit; font-family: inherit; color: #0a63a7;" target="_blank"&gt;Cisco PSIRT openVuln API&lt;/A&gt; called &lt;A class="jive-link-external-small" href="https://github.com/CiscoPSIRT/openVulnAPI" rel="nofollow" style="font-weight: inherit; font-style: inherit; font-family: inherit; color: #0a63a7;" target="_blank"&gt;openVulnQuery&lt;/A&gt;.&amp;nbsp; They have published and released the code of this Python based module in the&lt;A class="jive-link-external-small" href="https://github.com/CiscoPSIRT/openVulnAPI" rel="nofollow" style="font-weight: inherit; font-style: inherit; font-family: inherit; color: #0a63a7;" target="_blank"&gt; Cisco PSIRT github repository&lt;/A&gt;. This module allows users to query the openVuln API using the command line and retrieve additional fields out of CVRF (version 1.1) XML documents. With our custom XML parser they were able to take advantage of including new fields and eliminated the need to use the &lt;A class="jive-link-external-small" href="http://blogs.cisco.com/security/tools-of-the-trade-cvrfparse" rel="nofollow" style="font-weight: inherit; font-style: inherit; font-family: inherit; color: #0a63a7;" target="_blank"&gt;cvrfparser&lt;/A&gt; framework.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The following are examples of the new fields included:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Cisco bug IDs&lt;/LI&gt;&lt;/UL&gt;&lt;UL&gt;&lt;LI&gt;extensive vulnerability information&lt;/LI&gt;&lt;/UL&gt;&lt;UL&gt;&lt;LI&gt;full product list&lt;/LI&gt;&lt;/UL&gt;&lt;UL&gt;&lt;LI&gt;vulnerability summary&lt;/LI&gt;&lt;/UL&gt;&lt;UL&gt;&lt;LI&gt;document title&lt;/LI&gt;&lt;/UL&gt;&lt;UL&gt;&lt;LI&gt;publication URL&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Since the code is open source, you can also add the capability to add any other fields from the CVRF file.&amp;nbsp; There is even an option to save an API data call to a CSV or JSON file or display it out to the screen in a neat table.&lt;BR /&gt;&lt;SPAN data-node-type="line" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN data-node-type="line" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;&lt;A class="jive-link-external-small" href="https://github.com/CiscoPSIRT/openVulnAPI" rel="nofollow" style="font-weight: inherit; font-style: inherit; font-family: inherit; color: #0a63a7;" target="_blank"&gt;openVulnQuery&lt;/A&gt;&lt;/SPAN&gt;&lt;SPAN data-node-type="line" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt; is also a library with importable modules. User can import query_client module to initialize a client with appropriate credentials and perform queries on the &lt;A class="jive-link-external-small" href="https://developer.cisco.com/site/PSIRT/" rel="nofollow" style="font-weight: inherit; font-style: inherit; font-family: inherit; color: #0a63a7;" target="_blank"&gt;Cisco PSIRT openVuln API&lt;/A&gt;. &lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN data-node-type="line" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN data-node-type="line" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;The code is available in the&lt;A class="jive-link-external-small" href="https://github.com/CiscoPSIRT/openVulnAPI" rel="nofollow" style="font-weight: inherit; font-style: inherit; font-family: inherit; color: #0a63a7;" target="_blank"&gt; Cisco PSIRT github repository&lt;/A&gt; and the tool can also be installed using the Python Package Index (PyPI).&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN data-node-type="line" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-family: terminal, monaco;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; pip install openVulnQuery&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step-by-step examples and additional documentation can be found at the &lt;A class="jive-link-external-small" href="https://github.com/CiscoPSIRT/openVulnAPI/blob/master/openVulnQuery/README.md" rel="nofollow" style="font-weight: inherit; font-style: inherit; font-family: inherit; color: #0a63a7;" target="_blank"&gt;README.md &lt;/A&gt;file at the&lt;A class="jive-link-external-small" href="https://github.com/CiscoPSIRT/openVulnAPI" rel="nofollow" style="font-weight: inherit; font-style: inherit; font-family: inherit; color: #0a63a7;" target="_blank"&gt; Cisco PSIRT github repository&lt;/A&gt;. Please feel free to contribute to this tool and send us your comments.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Oct 2016 20:31:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/services-discussions/python-openvulnquery-client/m-p/3562340#M225</guid>
      <dc:creator>Omar Santos</dc:creator>
      <dc:date>2016-10-14T20:31:36Z</dc:date>
    </item>
  </channel>
</rss>

