You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
stix_id=MultipleChoiceFilter(help_text='Filter the results using the STIX ID of a `vulnerability` object. e.g. `vulnerability--4d2cad44-0a5a-5890-925c-29d535c3f49e`.')
148
-
cve_id=CharFilter(help_text='Filter the results using a CVE ID. e.g. `CVE-2023-22518`')
149
-
description=CharFilter(help_text='Filter the results by the description of the Vulnerability. Search is a wildcard, so `exploit` will return all descriptions that contain the string `exploit`.')
150
-
has_kev=BooleanFilter(label=dedent('''
151
-
Filter the results to only include those reported by CISA KEV (Known Exploited Vulnerability).
152
-
'''))
153
-
cpes_vulnerable=BaseCSVFilter(label=dedent('''
154
-
Filter Vulnerabilities that are vulnerable to a full or partial CPE Match String. Search is a wildcard to support partial match strings (e.g. `cpe:2.3:o:microsoft:windows` will match `cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*`, `cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*`, etc.\n\n
155
-
`cve-cpe` mode must have been triggered on the Arango CTI Processor endpoint for this to work.
156
-
'''))
157
-
cpes_in_pattern=BaseCSVFilter(label=dedent('''
158
-
Filter Vulnerabilities that contain a full or partial CPE Match String. Note, this will return Vulnerabilities that are vulnerable and not vulnerable (e.g. an operating system might not be vulnerable, but it might be required for software running on it to be vulnerable). Search is a wildcard to support partial match strings (e.g. `cpe:2.3:o:microsoft:windows` will match `cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*`, `cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*`, etc.\n\n
159
-
`cve-cpe` mode must have been triggered on the Arango CTI Processor endpoint for this to work.
160
-
'''))
161
-
weakness_id=BaseCSVFilter(label=dedent("""
162
-
Filter results by weakness (CWE ID). e.g. `CWE-122`.\n\n
163
-
filters using the `external_references` property of `vulnerability` object
164
-
"""))
165
-
cvss_base_score_min=NumberFilter(help_text="The minumum CVSS score you want. `0` is lowest, `10` is highest.")
166
-
epss_score_min=NumberFilter(help_text="The minimum EPSS score you want. Between `0` (lowest) and `1` highest to 2 decimal places (e.g. `9.34`).\n\n`cve-epss` mode must have been triggered on the Arango CTI Processor endpoint for this to work.")
167
-
epss_percentile_min=NumberFilter(help_text="The minimum EPSS percentile you want. Between `0` (lowest) and `1` highest to 2 decimal places (e.g. `9.34`).\n\n`cve-epss` mode must have been triggered on the Arango CTI Processor endpoint for this to work.")
168
-
created_min=DateTimeFilter(help_text="Is the minumum `created` value (`YYYY-MM-DDThh:mm:ss.sssZ`)")
169
-
created_max=DateTimeFilter(help_text="Is the maximum `created` value (`YYYY-MM-DDThh:mm:ss.sssZ`)")
170
-
171
-
modified_min=DateTimeFilter(label="Is the minumum `modified` value (`YYYY-MM-DDThh:mm:ss.sssZ`)")
172
-
modified_max=DateTimeFilter(label="Is the maximum `modified` value (`YYYY-MM-DDThh:mm:ss.sssZ`)")
Filter the results using the STIX ID of a `vulnerability` object. e.g. `vulnerability--4d2cad44-0a5a-5890-925c-29d535c3f49e`.
150
+
"""
151
+
))
152
+
cve_id=CharFilter(help_text=textwrap.dedent(
153
+
"""
154
+
Filter the results using a CVE ID. e.g. `CVE-2023-22518`
155
+
"""
156
+
))
157
+
description=CharFilter(help_text=textwrap.dedent(
158
+
"""
159
+
Filter the results by the description of the Vulnerability. Search is a wildcard, so `exploit` will return all descriptions that contain the string `exploit`.'
160
+
"""
161
+
))
162
+
has_kev=BooleanFilter(help_text=textwrap.dedent(
163
+
"""
164
+
Optionally filter the results to only include those reported by CISA KEV (Known Exploited Vulnerability).
Filter Vulnerabilities that are vulnerable to a full or partial CPE Match String. Search is a wildcard to support partial match strings (e.g. `cpe:2.3:o:microsoft:windows` will match `cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*`, `cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*`, etc.
Filter Vulnerabilities that contain a full or partial CPE Match String. Note, this will return Vulnerabilities that are vulnerable and not vulnerable (e.g. an operating system might not be vulnerable, but it might be required for software running on it to be vulnerable). Search is a wildcard to support partial match strings (e.g. `cpe:2.3:o:microsoft:windows` will match `cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*`, `cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*`, etc.
0 commit comments