This video covers an overview of a Python-based tool that can be used to interact and query the Cisco PSIRT openVuln API using the command line and retrieve additional fields out of Common Vulnerability Reporting Framework (CVRF) XML documents.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: