SHARE
TWEET

Untitled

a guest Mar 21st, 2017 76 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. {"count":66,"next":"https://api.app.secunia.com/api/tickets/?page=2","previous":null,"results":[{"id":592594,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2864,"name":"Low"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":null,"advisory":{"id":199009,"advisory_identifier":"SA74347","title":"VMware ESXi Script Insertion Vulnerability","released":"2016-12-21T22:28:44Z","modified_date":"2016-12-21T22:28:44Z","criticality":4,"criticality_description":"Less critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":4.3,"cvss_vector":"(AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-12-29T19:10:08Z","pretty_id":89,"custom_score":null,"last_updated":"2017-02-28T17:56:19Z"},{"id":588699,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2873,"name":"Urgent"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":4120,"username":"user4@company.com"},"asset_list":{"id":4777,"name":"Info Security Threat_Splunk"},"advisory":{"id":199003,"advisory_identifier":"SA74447","title":"Blue Coat Security Analytics Multiple Vulnerabilities","released":"2016-12-21T15:24:53Z","modified_date":"2016-12-21T15:24:53Z","criticality":2,"criticality_description":"Highly critical","solution_status":4,"solution_status_description":"Partial Fix","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:TF/RC:C)","type":0,"is_zero_day":false},"created":"2016-12-21T15:33:09Z","pretty_id":79,"custom_score":null,"last_updated":"2016-12-21T15:40:28Z"},{"id":584252,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2873,"name":"Urgent"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":4118,"username":"user3@company.com"},"asset_list":{"id":4657,"name":"PSS Middleware Environment"},"advisory":{"id":195840,"advisory_identifier":"SA73221","title":"Oracle Solaris Multiple Third Party Components Multiple Vulnerabilities","released":"2016-10-19T14:20:02Z","modified_date":"2016-12-19T14:42:30Z","criticality":2,"criticality_description":"Highly critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-12-20T13:43:24Z","pretty_id":76,"custom_score":null,"last_updated":"2017-01-11T19:47:09Z"},{"id":582514,"name":null,"status":{"id":2957,"name":"Open"},"priority":{"id":2864,"name":"Low"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":4030,"username":"user5@company.com"},"asset_list":{"id":4777,"name":"Info Security Threat_Splunk"},"advisory":{"id":198438,"advisory_identifier":"SA74209","title":"Blue Coat Security Analytics / Malware Analysis Appliance Multiple Vulnerabilities","released":"2016-12-09T16:21:06Z","modified_date":"2017-03-10T13:47:09Z","criticality":4,"criticality_description":"Less critical","solution_status":4,"solution_status_description":"Partial Fix","where":2,"where_description":"From local network","cvss_score":6.8,"cvss_vector":"(AV:L/AC:L/Au:S/C:C/I:C/A:C/E:U/RL:TF/RC:C)","type":0,"is_zero_day":false},"created":"2016-12-16T12:54:27Z","pretty_id":74,"custom_score":null,"last_updated":"2017-03-10T12:54:11Z"},{"id":576115,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2451,"username":"user2@company.com"},"asset_list":{"id":4649,"name":"Desktop Software"},"advisory":{"id":198595,"advisory_identifier":"SA74176","title":"Adobe Flash Player Multiple Vulnerabilities","released":"2016-12-13T18:09:21Z","modified_date":"2016-12-20T11:12:34Z","criticality":1,"criticality_description":"Extremely critical","solution_status":1,"solution_status_description":"Unpatched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:H/RL:U/RC:C)","type":0,"is_zero_day":true},"created":"2016-12-13T17:59:48Z","pretty_id":65,"custom_score":null,"last_updated":"2016-12-13T18:17:46Z"},{"id":385461,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4772,"name":"Datacom"},"advisory":{"id":195581,"advisory_identifier":"SA73087","title":"Cisco Unified Communications Manager Clickjacking Vulnerability","released":"2016-10-13T17:24:11Z","modified_date":"2016-10-13T17:24:11Z","criticality":4,"criticality_description":"Less critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":4.3,"cvss_vector":"(AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-13T16:40:45Z","pretty_id":64,"custom_score":null,"last_updated":"2016-12-15T17:58:44Z"},{"id":385458,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2864,"name":"Low"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2430,"username":"user6@company.com"},"asset_list":{"id":4617,"name":"Windows Server (IT-DTS)"},"advisory":{"id":192775,"advisory_identifier":"SA72020","title":"Microsoft Windows Multiple Security Bypass Vulnerabilities","released":"2016-08-09T20:44:12Z","modified_date":"2016-10-13T16:47:52Z","criticality":5,"criticality_description":"Not critical","solution_status":2,"solution_status_description":"Vendor Patched","where":2,"where_description":"From local network","cvss_score":5.4,"cvss_vector":"(AV:A/AC:M/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-13T16:29:35Z","pretty_id":63,"custom_score":null,"last_updated":"2016-12-15T20:08:34Z"},{"id":385456,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2864,"name":"Low"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2430,"username":"user6@company.com"},"asset_list":null,"advisory":{"id":192775,"advisory_identifier":"SA72020","title":"Microsoft Windows Multiple Security Bypass Vulnerabilities","released":"2016-08-09T20:44:12Z","modified_date":"2016-10-13T16:47:52Z","criticality":5,"criticality_description":"Not critical","solution_status":2,"solution_status_description":"Vendor Patched","where":2,"where_description":"From local network","cvss_score":5.4,"cvss_vector":"(AV:A/AC:M/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-13T16:29:15Z","pretty_id":62,"custom_score":null,"last_updated":"2016-12-15T20:08:33Z"},{"id":384586,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2451,"username":"user2@company.com"},"asset_list":{"id":4649,"name":"Desktop Software"},"advisory":{"id":195525,"advisory_identifier":"SA73061","title":"Google Chrome Multiple Vulnerabilities","released":"2016-10-13T09:54:04Z","modified_date":"2016-10-13T09:54:04Z","criticality":2,"criticality_description":"Highly critical","solution_status":1,"solution_status_description":"Unpatched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:U/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-13T11:32:31Z","pretty_id":61,"custom_score":null,"last_updated":"2016-10-13T12:16:39Z"},{"id":384395,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":null,"advisory":{"id":193122,"advisory_identifier":"SA72145","title":"Palo Alto Networks PAN-OS Multiple Vulnerabilities","released":"2016-08-16T14:42:05Z","modified_date":"2016-10-12T13:33:38Z","criticality":2,"criticality_description":"Highly critical","solution_status":1,"solution_status_description":"Unpatched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:U/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-12T13:37:12Z","pretty_id":60,"custom_score":null,"last_updated":"2016-12-15T17:58:44Z"},{"id":384394,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2864,"name":"Low"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":null,"advisory":{"id":195494,"advisory_identifier":"SA73047","title":"Palo Alto Networks PAN-OS Multiple Vulnerabilities","released":"2016-10-12T13:33:30Z","modified_date":"2016-11-18T15:06:52Z","criticality":3,"criticality_description":"Moderately critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":8.3,"cvss_vector":"(AV:A/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-12T13:27:21Z","pretty_id":59,"custom_score":null,"last_updated":"2016-12-15T17:58:44Z"},{"id":384392,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":null,"advisory":{"id":195497,"advisory_identifier":"SA73048","title":"Palo Alto PAN-OS Denial of Service Vulnerabilities","released":"2016-10-12T13:34:07Z","modified_date":"2016-10-12T13:34:07Z","criticality":3,"criticality_description":"Moderately critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":7.8,"cvss_vector":"(AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-12T13:16:19Z","pretty_id":58,"custom_score":null,"last_updated":"2016-12-15T17:58:43Z"},{"id":384389,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":null,"advisory":{"id":195500,"advisory_identifier":"SA73049","title":"Palo Alto Networks PAN-OS Multiple Vulnerabilities","released":"2016-10-12T13:34:15Z","modified_date":"2016-11-21T14:05:00Z","criticality":2,"criticality_description":"Highly critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-12T12:53:45Z","pretty_id":57,"custom_score":null,"last_updated":"2016-12-15T17:58:43Z"},{"id":384387,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":null,"advisory":{"id":195506,"advisory_identifier":"SA73064","title":"Palo Alto Networks PAN-OS Multiple Vulnerabilities","released":"2016-10-12T13:34:22Z","modified_date":"2016-11-18T15:06:49Z","criticality":3,"criticality_description":"Moderately critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":8.3,"cvss_vector":"(AV:A/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-12T12:47:19Z","pretty_id":56,"custom_score":null,"last_updated":"2016-12-15T17:58:43Z"},{"id":384307,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":null,"advisory":{"id":195467,"advisory_identifier":"SA72999","title":"VMware vRealize Operations Manager (vROps) Security Bypass Vulnerability","released":"2016-10-12T10:59:50Z","modified_date":"2016-11-16T12:35:58Z","criticality":4,"criticality_description":"Less critical","solution_status":2,"solution_status_description":"Vendor Patched","where":2,"where_description":"From local network","cvss_score":7.7,"cvss_vector":"(AV:A/AC:L/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-12T12:23:31Z","pretty_id":55,"custom_score":null,"last_updated":"2016-12-15T17:58:43Z"},{"id":377026,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2430,"username":"user6@company.com"},"asset_list":{"id":4617,"name":"Windows Server (IT-DTS)"},"advisory":{"id":195447,"advisory_identifier":"SA72977","title":"Microsoft Products Multiple Vulnerabilities","released":"2016-10-11T20:51:13Z","modified_date":"2016-10-21T13:40:48Z","criticality":1,"criticality_description":"Extremely critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:H/RL:OF/RC:C)","type":0,"is_zero_day":true},"created":"2016-10-11T19:29:38Z","pretty_id":54,"custom_score":null,"last_updated":"2016-10-12T13:55:41Z"},{"id":377024,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2430,"username":"user6@company.com"},"asset_list":null,"advisory":{"id":195447,"advisory_identifier":"SA72977","title":"Microsoft Products Multiple Vulnerabilities","released":"2016-10-11T20:51:13Z","modified_date":"2016-10-21T13:40:48Z","criticality":1,"criticality_description":"Extremely critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:H/RL:OF/RC:C)","type":0,"is_zero_day":true},"created":"2016-10-11T19:29:24Z","pretty_id":53,"custom_score":null,"last_updated":"2016-10-12T13:55:20Z"},{"id":377021,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2430,"username":"user6@company.com"},"asset_list":{"id":4649,"name":"Desktop Software"},"advisory":{"id":195447,"advisory_identifier":"SA72977","title":"Microsoft Products Multiple Vulnerabilities","released":"2016-10-11T20:51:13Z","modified_date":"2016-10-21T13:40:48Z","criticality":1,"criticality_description":"Extremely critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:H/RL:OF/RC:C)","type":0,"is_zero_day":true},"created":"2016-10-11T19:29:12Z","pretty_id":52,"custom_score":null,"last_updated":"2016-10-12T13:54:36Z"},{"id":377019,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2430,"username":"user6@company.com"},"asset_list":{"id":4617,"name":"Windows Server (IT-DTS)"},"advisory":{"id":195450,"advisory_identifier":"SA72988","title":"Microsoft Windows Multiple Privilege Escalation Vulnerabilities","released":"2016-10-11T20:51:38Z","modified_date":"2016-10-21T13:41:59Z","criticality":4,"criticality_description":"Less critical","solution_status":2,"solution_status_description":"Vendor Patched","where":3,"where_description":"Local system","cvss_score":6.8,"cvss_vector":"(AV:L/AC:L/Au:S/C:C/I:C/A:C/E:F/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-11T19:28:56Z","pretty_id":51,"custom_score":null,"last_updated":"2016-10-12T13:53:51Z"},{"id":377017,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2430,"username":"user6@company.com"},"asset_list":null,"advisory":{"id":195450,"advisory_identifier":"SA72988","title":"Microsoft Windows Multiple Privilege Escalation Vulnerabilities","released":"2016-10-11T20:51:38Z","modified_date":"2016-10-21T13:41:59Z","criticality":4,"criticality_description":"Less critical","solution_status":2,"solution_status_description":"Vendor Patched","where":3,"where_description":"Local system","cvss_score":6.8,"cvss_vector":"(AV:L/AC:L/Au:S/C:C/I:C/A:C/E:F/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-11T19:28:42Z","pretty_id":50,"custom_score":null,"last_updated":"2016-10-12T13:53:37Z"}]}{"count":66,"next":"https://api.app.secunia.com/api/tickets/?page=3","previous":"https://api.app.secunia.com/api/tickets/","results":[{"id":377015,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2864,"name":"Low"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2430,"username":"user6@company.com"},"asset_list":{"id":4617,"name":"Windows Server (IT-DTS)"},"advisory":{"id":195453,"advisory_identifier":"SA72990","title":"Microsoft Windows Kernel Multiple Vulnerabilities","released":"2016-10-11T20:54:42Z","modified_date":"2016-10-25T12:34:19Z","criticality":4,"criticality_description":"Less critical","solution_status":2,"solution_status_description":"Vendor Patched","where":3,"where_description":"Local system","cvss_score":6.8,"cvss_vector":"(AV:L/AC:L/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-11T19:28:28Z","pretty_id":49,"custom_score":null,"last_updated":"2016-10-12T13:56:13Z"},{"id":377012,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2864,"name":"Low"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2430,"username":"user6@company.com"},"asset_list":null,"advisory":{"id":195453,"advisory_identifier":"SA72990","title":"Microsoft Windows Kernel Multiple Vulnerabilities","released":"2016-10-11T20:54:42Z","modified_date":"2016-10-25T12:34:19Z","criticality":4,"criticality_description":"Less critical","solution_status":2,"solution_status_description":"Vendor Patched","where":3,"where_description":"Local system","cvss_score":6.8,"cvss_vector":"(AV:L/AC:L/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-11T19:28:15Z","pretty_id":48,"custom_score":null,"last_updated":"2016-10-12T13:56:25Z"},{"id":377009,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2430,"username":"user6@company.com"},"asset_list":{"id":4617,"name":"Windows Server (IT-DTS)"},"advisory":{"id":195456,"advisory_identifier":"SA72996","title":"Microsoft Windows Flash Player Multiple Vulnerabilities","released":"2016-10-11T20:55:43Z","modified_date":"2016-10-11T20:55:43Z","criticality":2,"criticality_description":"Highly critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-11T19:28:00Z","pretty_id":47,"custom_score":null,"last_updated":"2016-10-12T13:56:35Z"},{"id":377007,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2430,"username":"user6@company.com"},"asset_list":null,"advisory":{"id":195456,"advisory_identifier":"SA72996","title":"Microsoft Windows Flash Player Multiple Vulnerabilities","released":"2016-10-11T20:55:43Z","modified_date":"2016-10-11T20:55:43Z","criticality":2,"criticality_description":"Highly critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-11T19:27:47Z","pretty_id":46,"custom_score":null,"last_updated":"2016-10-12T13:56:44Z"},{"id":377004,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2430,"username":"user6@company.com"},"asset_list":{"id":4649,"name":"Desktop Software"},"advisory":{"id":195459,"advisory_identifier":"SA72985","title":"Microsoft Multiple Products RTF Memory Corruption Vulnerability","released":"2016-10-11T21:03:39Z","modified_date":"2016-10-11T21:03:39Z","criticality":1,"criticality_description":"Extremely critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:H/RL:OF/RC:C)","type":0,"is_zero_day":true},"created":"2016-10-11T19:27:33Z","pretty_id":45,"custom_score":null,"last_updated":"2016-10-12T13:57:08Z"},{"id":375969,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2430,"username":"user6@company.com"},"asset_list":null,"advisory":{"id":195436,"advisory_identifier":"SA72987","title":"Microsoft Windows Microsoft Video Control Code Execution Vulnerability","released":"2016-10-11T20:21:38Z","modified_date":"2016-10-11T20:21:38Z","criticality":2,"criticality_description":"Highly critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-11T18:53:00Z","pretty_id":44,"custom_score":null,"last_updated":"2016-10-12T13:57:17Z"},{"id":375967,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2430,"username":"user6@company.com"},"asset_list":{"id":4617,"name":"Windows Server (IT-DTS)"},"advisory":{"id":195444,"advisory_identifier":"SA72995","title":"Microsoft Windows Internet Messaging API Information Disclosure Vulnerability","released":"2016-10-11T20:40:24Z","modified_date":"2016-10-11T20:40:24Z","criticality":3,"criticality_description":"Moderately critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":5.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:P/I:N/A:N/E:F/RL:OF/RC:C)","type":0,"is_zero_day":true},"created":"2016-10-11T18:52:56Z","pretty_id":43,"custom_score":null,"last_updated":"2016-10-12T13:57:26Z"},{"id":375964,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2430,"username":"user6@company.com"},"asset_list":null,"advisory":{"id":195444,"advisory_identifier":"SA72995","title":"Microsoft Windows Internet Messaging API Information Disclosure Vulnerability","released":"2016-10-11T20:40:24Z","modified_date":"2016-10-11T20:40:24Z","criticality":3,"criticality_description":"Moderately critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":5.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:P/I:N/A:N/E:F/RL:OF/RC:C)","type":0,"is_zero_day":true},"created":"2016-10-11T18:52:53Z","pretty_id":42,"custom_score":null,"last_updated":"2016-10-12T13:57:37Z"},{"id":375344,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2430,"username":"user6@company.com"},"asset_list":null,"advisory":{"id":195435,"advisory_identifier":"SA72994","title":"Microsoft Windows Diagnostics Hub Standard Collector Service Privilege Escalation Vulnerability","released":"2016-10-11T19:42:25Z","modified_date":"2016-10-18T12:03:09Z","criticality":4,"criticality_description":"Less critical","solution_status":2,"solution_status_description":"Vendor Patched","where":3,"where_description":"Local system","cvss_score":6.8,"cvss_vector":"(AV:L/AC:L/Au:S/C:C/I:C/A:C/E:H/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-11T18:24:00Z","pretty_id":41,"custom_score":null,"last_updated":"2016-10-12T13:57:50Z"},{"id":375244,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2864,"name":"Low"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4657,"name":"PSS Middleware Environment"},"advisory":{"id":195378,"advisory_identifier":"SA72899","title":"Red Hat update for kernel","released":"2016-10-11T16:49:35Z","modified_date":"2016-10-11T16:49:35Z","criticality":4,"criticality_description":"Less critical","solution_status":2,"solution_status_description":"Vendor Patched","where":2,"where_description":"From local network","cvss_score":6.1,"cvss_vector":"(AV:A/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-11T16:59:32Z","pretty_id":40,"custom_score":null,"last_updated":"2016-12-15T17:58:43Z"},{"id":375241,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4657,"name":"PSS Middleware Environment"},"advisory":{"id":195381,"advisory_identifier":"SA72906","title":"Red Hat update for tomcat","released":"2016-10-11T16:49:47Z","modified_date":"2016-10-11T16:49:47Z","criticality":3,"criticality_description":"Moderately critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":9.3,"cvss_vector":"(AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-11T16:59:13Z","pretty_id":39,"custom_score":null,"last_updated":"2016-12-15T17:58:43Z"},{"id":375238,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4657,"name":"PSS Middleware Environment"},"advisory":{"id":195384,"advisory_identifier":"SA72910","title":"Red Hat update for tomcat6","released":"2016-10-11T16:50:19Z","modified_date":"2016-10-11T16:50:19Z","criticality":3,"criticality_description":"Moderately critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":7.5,"cvss_vector":"(AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-11T16:58:54Z","pretty_id":38,"custom_score":null,"last_updated":"2016-12-15T17:58:43Z"},{"id":375236,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2449,"username":"user7@company.com"},"asset_list":{"id":4649,"name":"Desktop Software"},"advisory":{"id":195422,"advisory_identifier":"SA72950","title":"Adobe Flash Player Multiple Vulnerabilities","released":"2016-10-11T17:43:27Z","modified_date":"2016-10-13T19:01:37Z","criticality":2,"criticality_description":"Highly critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-11T16:52:56Z","pretty_id":37,"custom_score":null,"last_updated":"2016-10-11T19:29:57Z"},{"id":375233,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2449,"username":"user7@company.com"},"asset_list":{"id":4649,"name":"Desktop Software"},"advisory":{"id":195426,"advisory_identifier":"SA72948","title":"Adobe Reader / Acrobat Multiple Vulnerabilities","released":"2016-10-11T17:52:31Z","modified_date":"2016-11-15T15:46:54Z","criticality":2,"criticality_description":"Highly critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-11T16:52:38Z","pretty_id":36,"custom_score":null,"last_updated":"2016-10-11T19:29:38Z"},{"id":373559,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4772,"name":"Datacom"},"advisory":{"id":195151,"advisory_identifier":"SA72869","title":"Cisco Multiple Nexus Series Switches NX-OS Border Gateway Protocol Denial of Service Vulnerability","released":"2016-10-06T15:42:09Z","modified_date":"2016-10-06T15:42:09Z","criticality":5,"criticality_description":"Not critical","solution_status":4,"solution_status_description":"Partial Fix","where":2,"where_description":"From local network","cvss_score":5.7,"cvss_vector":"(AV:A/AC:M/Au:N/C:N/I:N/A:C/E:U/RL:TF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-10T13:39:21Z","pretty_id":35,"custom_score":null,"last_updated":"2016-12-15T17:58:43Z"},{"id":373556,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4772,"name":"Datacom"},"advisory":{"id":195154,"advisory_identifier":"SA72870","title":"Cisco Multiple Nexus Series Switches NX-OS DHCP Denial of Service Vulnerability","released":"2016-10-06T15:42:37Z","modified_date":"2016-10-06T15:42:37Z","criticality":4,"criticality_description":"Less critical","solution_status":4,"solution_status_description":"Partial Fix","where":2,"where_description":"From local network","cvss_score":6.1,"cvss_vector":"(AV:A/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:TF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-10T13:23:15Z","pretty_id":34,"custom_score":null,"last_updated":"2016-12-15T17:58:42Z"},{"id":373374,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4772,"name":"Datacom"},"advisory":{"id":195157,"advisory_identifier":"SA72874","title":"Cisco Multiple Nexus Series Switches NX-OS DHCP Denial of Service Vulnerability","released":"2016-10-06T15:42:55Z","modified_date":"2016-10-06T15:42:55Z","criticality":4,"criticality_description":"Less critical","solution_status":4,"solution_status_description":"Partial Fix","where":2,"where_description":"From local network","cvss_score":6.1,"cvss_vector":"(AV:A/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:TF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-10T13:13:22Z","pretty_id":33,"custom_score":null,"last_updated":"2016-12-15T17:58:42Z"},{"id":373372,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4772,"name":"Datacom"},"advisory":{"id":195160,"advisory_identifier":"SA72879","title":"Cisco Multiple Nexus Series Switches NX-OS Security Bypass Vulnerability","released":"2016-10-06T15:43:16Z","modified_date":"2016-10-06T15:43:16Z","criticality":4,"criticality_description":"Less critical","solution_status":4,"solution_status_description":"Partial Fix","where":2,"where_description":"From local network","cvss_score":7.7,"cvss_vector":"(AV:A/AC:L/Au:S/C:C/I:C/A:C/E:U/RL:TF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-10T13:02:09Z","pretty_id":32,"custom_score":null,"last_updated":"2016-12-15T17:58:42Z"},{"id":372658,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4772,"name":"Datacom"},"advisory":{"id":195166,"advisory_identifier":"SA72964","title":"Cisco Catalyst 6500 Series Switches / 7600 Series Routers IOS Security Bypass Vulnerability","released":"2016-10-06T15:44:12Z","modified_date":"2016-10-06T15:44:12Z","criticality":3,"criticality_description":"Moderately critical","solution_status":1,"solution_status_description":"Unpatched","where":1,"where_description":"From remote","cvss_score":5.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:N/I:P/A:N/E:U/RL:U/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-07T15:03:36Z","pretty_id":31,"custom_score":null,"last_updated":"2016-12-15T17:58:42Z"},{"id":372657,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4772,"name":"Datacom"},"advisory":{"id":195169,"advisory_identifier":"SA72973","title":"Cisco Adaptive Security Appliance (ASA) DHCP Relay Denial of Service Vulnerability","released":"2016-10-06T15:44:20Z","modified_date":"2016-10-06T15:44:20Z","criticality":4,"criticality_description":"Less critical","solution_status":4,"solution_status_description":"Partial Fix","where":2,"where_description":"From local network","cvss_score":6.1,"cvss_vector":"(AV:A/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:TF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-07T14:53:39Z","pretty_id":30,"custom_score":null,"last_updated":"2016-12-15T17:58:42Z"}]}{"count":66,"next":"https://api.app.secunia.com/api/tickets/?page=4","previous":"https://api.app.secunia.com/api/tickets/?page=2","results":[{"id":372656,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2873,"name":"Urgent"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4772,"name":"Datacom"},"advisory":{"id":195175,"advisory_identifier":"SA72889","title":"Cisco Nexus 7000 Series Switches NX-OS OTV Buffer Overflow Vulnerability","released":"2016-10-06T17:42:01Z","modified_date":"2016-10-06T17:42:01Z","criticality":3,"criticality_description":"Moderately critical","solution_status":4,"solution_status_description":"Partial Fix","where":2,"where_description":"From local network","cvss_score":8.3,"cvss_vector":"(AV:A/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:TF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-07T14:48:28Z","pretty_id":29,"custom_score":null,"last_updated":"2016-10-07T14:48:28Z"},{"id":372654,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":null,"advisory":{"id":195251,"advisory_identifier":"SA72896","title":"VMware Horizon View Connection Server Directory Traversal Vulnerability","released":"2016-10-07T14:01:48Z","modified_date":"2016-10-12T11:00:55Z","criticality":4,"criticality_description":"Less critical","solution_status":2,"solution_status_description":"Vendor Patched","where":2,"where_description":"From local network","cvss_score":3.3,"cvss_vector":"(AV:A/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-07T13:55:40Z","pretty_id":28,"custom_score":null,"last_updated":"2016-12-15T17:58:42Z"},{"id":324008,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4659,"name":"Security Engineer Apps"},"advisory":{"id":195040,"advisory_identifier":"SA72844","title":"Pulse Connect Secure OpenSSL Multiple Denial of Service Vulnerabilities","released":"2016-10-05T11:45:15Z","modified_date":"2016-10-05T11:45:15Z","criticality":3,"criticality_description":"Moderately critical","solution_status":1,"solution_status_description":"Unpatched","where":1,"where_description":"From remote","cvss_score":7.8,"cvss_vector":"(AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:U/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-05T17:55:42Z","pretty_id":26,"custom_score":null,"last_updated":"2016-12-15T17:58:41Z"},{"id":324005,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4659,"name":"Security Engineer Apps"},"advisory":{"id":195046,"advisory_identifier":"SA72926","title":"Pulse Secure Network Connect OpenSSL SHA512 Denial of Service Vulnerability","released":"2016-10-05T11:45:22Z","modified_date":"2016-10-05T11:45:22Z","criticality":3,"criticality_description":"Moderately critical","solution_status":1,"solution_status_description":"Unpatched","where":1,"where_description":"From remote","cvss_score":7.8,"cvss_vector":"(AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:U/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-05T17:55:18Z","pretty_id":25,"custom_score":null,"last_updated":"2016-12-15T17:58:41Z"},{"id":324004,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4657,"name":"PSS Middleware Environment"},"advisory":{"id":195049,"advisory_identifier":"SA72821","title":"Red Hat update for kernel","released":"2016-10-05T11:51:34Z","modified_date":"2016-10-05T11:51:34Z","criticality":4,"criticality_description":"Less critical","solution_status":2,"solution_status_description":"Vendor Patched","where":3,"where_description":"Local system","cvss_score":6.8,"cvss_vector":"(AV:L/AC:L/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-05T17:50:29Z","pretty_id":24,"custom_score":null,"last_updated":"2016-12-15T17:58:41Z"},{"id":322427,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4649,"name":"Desktop Software"},"advisory":{"id":194748,"advisory_identifier":"SA72789","title":"Cisco Multiple Products OpenSSL Multiple Vulnerabilities","released":"2016-09-28T13:26:11Z","modified_date":"2016-09-28T13:26:11Z","criticality":3,"criticality_description":"Moderately critical","solution_status":1,"solution_status_description":"Unpatched","where":1,"where_description":"From remote","cvss_score":7.8,"cvss_vector":"(AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:U/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-04T16:39:51Z","pretty_id":23,"custom_score":null,"last_updated":"2016-12-15T17:58:41Z"},{"id":322415,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4772,"name":"Datacom"},"advisory":{"id":194824,"advisory_identifier":"SA72790","title":"Cisco IOS XE Network Address Translation (NAT) Denial of Service Vulnerability","released":"2016-09-29T14:46:30Z","modified_date":"2016-09-29T14:46:30Z","criticality":4,"criticality_description":"Less critical","solution_status":2,"solution_status_description":"Vendor Patched","where":2,"where_description":"From local network","cvss_score":6.1,"cvss_vector":"(AV:A/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-04T16:34:07Z","pretty_id":22,"custom_score":null,"last_updated":"2016-12-15T17:58:41Z"},{"id":321988,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4772,"name":"Datacom"},"advisory":{"id":194846,"advisory_identifier":"SA72793","title":"Cisco IOS / IOS XE AAA Service Denial of Service Vulnerability","released":"2016-09-29T15:36:33Z","modified_date":"2016-09-29T15:36:33Z","criticality":4,"criticality_description":"Less critical","solution_status":2,"solution_status_description":"Vendor Patched","where":2,"where_description":"From local network","cvss_score":6.1,"cvss_vector":"(AV:A/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-04T15:16:32Z","pretty_id":21,"custom_score":null,"last_updated":"2016-12-15T17:58:41Z"},{"id":321986,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4772,"name":"Datacom"},"advisory":{"id":194859,"advisory_identifier":"SA72755","title":"Cisco IOS / IOS XE Smart Install Memory Leak Vulnerability","released":"2016-09-29T15:55:21Z","modified_date":"2016-09-29T15:55:21Z","criticality":4,"criticality_description":"Less critical","solution_status":2,"solution_status_description":"Vendor Patched","where":2,"where_description":"From local network","cvss_score":6.1,"cvss_vector":"(AV:A/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-04T15:11:11Z","pretty_id":20,"custom_score":null,"last_updated":"2016-12-15T17:58:41Z"},{"id":321985,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4772,"name":"Datacom"},"advisory":{"id":194862,"advisory_identifier":"SA72756","title":"Cisco IOS / IOS XE Multiple Denial of Service Vulnerabilities","released":"2016-09-29T15:56:44Z","modified_date":"2016-09-29T15:56:44Z","criticality":3,"criticality_description":"Moderately critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":7.8,"cvss_vector":"(AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-04T15:06:13Z","pretty_id":19,"custom_score":null,"last_updated":"2016-12-15T17:58:40Z"},{"id":321983,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4772,"name":"Datacom"},"advisory":{"id":194865,"advisory_identifier":"SA72757","title":"Cisco IOS / IOS XE IP Detail Record Denial of Service Vulnerability","released":"2016-09-29T15:57:26Z","modified_date":"2016-09-29T15:57:26Z","criticality":4,"criticality_description":"Less critical","solution_status":2,"solution_status_description":"Vendor Patched","where":2,"where_description":"From local network","cvss_score":6.1,"cvss_vector":"(AV:A/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-04T15:00:44Z","pretty_id":18,"custom_score":null,"last_updated":"2016-12-15T17:58:40Z"},{"id":321980,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4772,"name":"Datacom"},"advisory":{"id":194880,"advisory_identifier":"SA72773","title":"Cisco Multiple Products IP Fragment Reassembly Denial of Service Vulnerability","released":"2016-09-29T17:14:35Z","modified_date":"2016-09-29T17:14:35Z","criticality":3,"criticality_description":"Moderately critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":7.8,"cvss_vector":"(AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-04T14:51:52Z","pretty_id":17,"custom_score":null,"last_updated":"2016-12-15T17:58:40Z"},{"id":321977,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4772,"name":"Datacom"},"advisory":{"id":194883,"advisory_identifier":"SA72792","title":"Cisco IOS DNS Forwarder Vulnerability","released":"2016-09-29T17:16:12Z","modified_date":"2016-09-29T17:16:12Z","criticality":3,"criticality_description":"Moderately critical","solution_status":2,"solution_status_description":"Vendor Patched","where":2,"where_description":"From local network","cvss_score":7.3,"cvss_vector":"(AV:A/AC:L/Au:N/C:P/I:P/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-04T14:45:04Z","pretty_id":16,"custom_score":null,"last_updated":"2016-12-15T17:58:40Z"},{"id":321974,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":null,"advisory":{"id":194976,"advisory_identifier":"SA72876","title":"Palo Alto PAN-OS Denial of Service Vulnerabilities","released":"2016-10-04T15:04:11Z","modified_date":"2016-11-01T14:25:00Z","criticality":3,"criticality_description":"Moderately critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":7.8,"cvss_vector":"(AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-04T14:37:42Z","pretty_id":15,"custom_score":null,"last_updated":"2016-12-15T17:58:40Z"},{"id":321971,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4657,"name":"PSS Middleware Environment"},"advisory":{"id":194980,"advisory_identifier":"SA72720","title":"Red Hat update for thunderbird","released":"2016-10-04T15:35:38Z","modified_date":"2016-10-04T15:35:38Z","criticality":2,"criticality_description":"Highly critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-04T14:19:34Z","pretty_id":14,"custom_score":null,"last_updated":"2016-12-15T17:58:40Z"},{"id":321345,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4657,"name":"PSS Middleware Environment"},"advisory":{"id":191968,"advisory_identifier":"SA71733","title":"Oracle Solaris Multiple Third Party Components Multiple Vulnerabilities","released":"2016-07-20T17:16:10Z","modified_date":"2017-02-13T12:45:36Z","criticality":2,"criticality_description":"Highly critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-04T12:28:40Z","pretty_id":13,"custom_score":null,"last_updated":"2016-12-15T17:58:40Z"},{"id":321344,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4657,"name":"PSS Middleware Environment"},"advisory":{"id":194898,"advisory_identifier":"SA72713","title":"Red Hat update for python-twisted-web","released":"2016-09-30T11:35:57Z","modified_date":"2016-09-30T11:35:57Z","criticality":3,"criticality_description":"Moderately critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":7.5,"cvss_vector":"(AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-04T12:23:46Z","pretty_id":12,"custom_score":null,"last_updated":"2016-12-15T17:58:40Z"},{"id":321341,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4657,"name":"PSS Middleware Environment"},"advisory":{"id":194807,"advisory_identifier":"SA72627","title":"Red Hat update for bind97","released":"2016-09-29T12:09:41Z","modified_date":"2016-09-29T12:09:41Z","criticality":3,"criticality_description":"Moderately critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":7.8,"cvss_vector":"(AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-04T12:22:52Z","pretty_id":11,"custom_score":null,"last_updated":"2016-12-15T17:58:39Z"},{"id":321338,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4657,"name":"PSS Middleware Environment"},"advisory":{"id":194810,"advisory_identifier":"SA72728","title":"Red Hat update for bind","released":"2016-09-29T12:09:56Z","modified_date":"2016-09-29T12:09:56Z","criticality":3,"criticality_description":"Moderately critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":7.8,"cvss_vector":"(AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-04T12:22:03Z","pretty_id":10,"custom_score":null,"last_updated":"2016-12-15T17:58:39Z"},{"id":321337,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4657,"name":"PSS Middleware Environment"},"advisory":{"id":194722,"advisory_identifier":"SA72635","title":"Red Hat update for openssl","released":"2016-09-28T12:39:51Z","modified_date":"2016-10-17T14:44:11Z","criticality":3,"criticality_description":"Moderately critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":7.8,"cvss_vector":"(AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-04T12:20:56Z","pretty_id":9,"custom_score":null,"last_updated":"2016-12-15T17:58:39Z"}]}{"count":66,"next":null,"previous":"https://api.app.secunia.com/api/tickets/?page=3","results":[{"id":321230,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2449,"username":"user7@company.com"},"asset_list":{"id":4649,"name":"Desktop Software"},"advisory":{"id":194895,"advisory_identifier":"SA72819","title":"Google Chrome Multiple Vulnerabilities","released":"2016-09-30T09:28:56Z","modified_date":"2016-09-30T09:28:56Z","criticality":2,"criticality_description":"Highly critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-03T19:05:01Z","pretty_id":8,"custom_score":null,"last_updated":"2016-10-04T13:00:05Z"},{"id":312852,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2449,"username":"user7@company.com"},"asset_list":{"id":4649,"name":"Desktop Software"},"advisory":{"id":194394,"advisory_identifier":"SA72600","title":"Apple Safari Multiple Vulnerabilities","released":"2016-09-21T11:29:26Z","modified_date":"2016-09-28T14:38:09Z","criticality":2,"criticality_description":"Highly critical","solution_status":1,"solution_status_description":"Unpatched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:U/RC:C)","type":0,"is_zero_day":false},"created":"2016-09-21T11:32:38Z","pretty_id":5,"custom_score":null,"last_updated":"2016-09-21T12:02:31Z"},{"id":312849,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4657,"name":"PSS Middleware Environment"},"advisory":{"id":194406,"advisory_identifier":"SA72669","title":"Red Hat update for firefox","released":"2016-09-21T12:59:46Z","modified_date":"2016-09-21T12:59:46Z","criticality":2,"criticality_description":"Highly critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-09-21T11:25:50Z","pretty_id":4,"custom_score":null,"last_updated":"2016-12-15T17:58:39Z"},{"id":312301,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4659,"name":"Security Engineer Apps"},"advisory":{"id":194372,"advisory_identifier":"SA72624","title":"Symantec Multiple Products Decomposer Engine RAR Multiple Vulnerabilities","released":"2016-09-20T15:08:36Z","modified_date":"2016-09-23T09:53:20Z","criticality":2,"criticality_description":"Highly critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-09-20T13:35:35Z","pretty_id":3,"custom_score":null,"last_updated":"2016-12-15T17:58:39Z"},{"id":288866,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":null,"advisory":{"id":192618,"advisory_identifier":"SA71966","title":"VMware Multiple Products vmhgfs.dll Insecure Library Loading Vulnerability","released":"2016-08-05T12:47:58Z","modified_date":"2016-09-20T12:04:25Z","criticality":2,"criticality_description":"Highly critical","solution_status":4,"solution_status_description":"Partial Fix","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:TF/RC:C)","type":0,"is_zero_day":false},"created":"2016-09-20T10:13:19Z","pretty_id":2,"custom_score":null,"last_updated":"2016-12-15T17:58:39Z"},{"id":288853,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4649,"name":"Desktop Software"},"advisory":{"id":192876,"advisory_identifier":"SA72101","title":"Pulse Connect Secure / Policy Secure Samba Multiple Vulnerabilities","released":"2016-08-11T16:15:46Z","modified_date":"2017-02-13T13:28:44Z","criticality":3,"criticality_description":"Moderately critical","solution_status":4,"solution_status_description":"Partial Fix","where":2,"where_description":"From local network","cvss_score":8.3,"cvss_vector":"(AV:A/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:TF/RC:C)","type":0,"is_zero_day":false},"created":"2016-09-19T14:03:22Z","pretty_id":1,"custom_score":null,"last_updated":"2017-02-28T17:57:11Z"}]}{"detail":"Invalid page \"5\": That page contains no results."}{"detail":"Invalid page \"6\": That page contains no results."}{"detail":"Invalid page \"7\": That page contains no results."}{"count":66,"next":"https://api.app.secunia.com/api/tickets/?page=2","previous":null,"results":[{"id":592594,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2864,"name":"Low"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":null,"advisory":{"id":199009,"advisory_identifier":"SA74347","title":"VMware ESXi Script Insertion Vulnerability","released":"2016-12-21T22:28:44Z","modified_date":"2016-12-21T22:28:44Z","criticality":4,"criticality_description":"Less critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":4.3,"cvss_vector":"(AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-12-29T19:10:08Z","pretty_id":89,"custom_score":null,"last_updated":"2017-02-28T17:56:19Z"},{"id":588699,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2873,"name":"Urgent"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":4120,"username":"user4@company.com"},"asset_list":{"id":4777,"name":"Info Security Threat_Splunk"},"advisory":{"id":199003,"advisory_identifier":"SA74447","title":"Blue Coat Security Analytics Multiple Vulnerabilities","released":"2016-12-21T15:24:53Z","modified_date":"2016-12-21T15:24:53Z","criticality":2,"criticality_description":"Highly critical","solution_status":4,"solution_status_description":"Partial Fix","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:TF/RC:C)","type":0,"is_zero_day":false},"created":"2016-12-21T15:33:09Z","pretty_id":79,"custom_score":null,"last_updated":"2016-12-21T15:40:28Z"},{"id":584252,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2873,"name":"Urgent"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":4118,"username":"user3@company.com"},"asset_list":{"id":4657,"name":"PSS Middleware Environment"},"advisory":{"id":195840,"advisory_identifier":"SA73221","title":"Oracle Solaris Multiple Third Party Components Multiple Vulnerabilities","released":"2016-10-19T14:20:02Z","modified_date":"2016-12-19T14:42:30Z","criticality":2,"criticality_description":"Highly critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-12-20T13:43:24Z","pretty_id":76,"custom_score":null,"last_updated":"2017-01-11T19:47:09Z"},{"id":582514,"name":null,"status":{"id":2957,"name":"Open"},"priority":{"id":2864,"name":"Low"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":4030,"username":"user5@company.com"},"asset_list":{"id":4777,"name":"Info Security Threat_Splunk"},"advisory":{"id":198438,"advisory_identifier":"SA74209","title":"Blue Coat Security Analytics / Malware Analysis Appliance Multiple Vulnerabilities","released":"2016-12-09T16:21:06Z","modified_date":"2017-03-10T13:47:09Z","criticality":4,"criticality_description":"Less critical","solution_status":4,"solution_status_description":"Partial Fix","where":2,"where_description":"From local network","cvss_score":6.8,"cvss_vector":"(AV:L/AC:L/Au:S/C:C/I:C/A:C/E:U/RL:TF/RC:C)","type":0,"is_zero_day":false},"created":"2016-12-16T12:54:27Z","pretty_id":74,"custom_score":null,"last_updated":"2017-03-10T12:54:11Z"},{"id":576115,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2451,"username":"user2@company.com"},"asset_list":{"id":4649,"name":"Desktop Software"},"advisory":{"id":198595,"advisory_identifier":"SA74176","title":"Adobe Flash Player Multiple Vulnerabilities","released":"2016-12-13T18:09:21Z","modified_date":"2016-12-20T11:12:34Z","criticality":1,"criticality_description":"Extremely critical","solution_status":1,"solution_status_description":"Unpatched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:H/RL:U/RC:C)","type":0,"is_zero_day":true},"created":"2016-12-13T17:59:48Z","pretty_id":65,"custom_score":null,"last_updated":"2016-12-13T18:17:46Z"},{"id":385461,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4772,"name":"Datacom"},"advisory":{"id":195581,"advisory_identifier":"SA73087","title":"Cisco Unified Communications Manager Clickjacking Vulnerability","released":"2016-10-13T17:24:11Z","modified_date":"2016-10-13T17:24:11Z","criticality":4,"criticality_description":"Less critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":4.3,"cvss_vector":"(AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-13T16:40:45Z","pretty_id":64,"custom_score":null,"last_updated":"2016-12-15T17:58:44Z"},{"id":385458,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2864,"name":"Low"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2430,"username":"user6@company.com"},"asset_list":{"id":4617,"name":"Windows Server (IT-DTS)"},"advisory":{"id":192775,"advisory_identifier":"SA72020","title":"Microsoft Windows Multiple Security Bypass Vulnerabilities","released":"2016-08-09T20:44:12Z","modified_date":"2016-10-13T16:47:52Z","criticality":5,"criticality_description":"Not critical","solution_status":2,"solution_status_description":"Vendor Patched","where":2,"where_description":"From local network","cvss_score":5.4,"cvss_vector":"(AV:A/AC:M/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-13T16:29:35Z","pretty_id":63,"custom_score":null,"last_updated":"2016-12-15T20:08:34Z"},{"id":385456,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2864,"name":"Low"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2430,"username":"user6@company.com"},"asset_list":null,"advisory":{"id":192775,"advisory_identifier":"SA72020","title":"Microsoft Windows Multiple Security Bypass Vulnerabilities","released":"2016-08-09T20:44:12Z","modified_date":"2016-10-13T16:47:52Z","criticality":5,"criticality_description":"Not critical","solution_status":2,"solution_status_description":"Vendor Patched","where":2,"where_description":"From local network","cvss_score":5.4,"cvss_vector":"(AV:A/AC:M/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-13T16:29:15Z","pretty_id":62,"custom_score":null,"last_updated":"2016-12-15T20:08:33Z"},{"id":384586,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2451,"username":"user2@company.com"},"asset_list":{"id":4649,"name":"Desktop Software"},"advisory":{"id":195525,"advisory_identifier":"SA73061","title":"Google Chrome Multiple Vulnerabilities","released":"2016-10-13T09:54:04Z","modified_date":"2016-10-13T09:54:04Z","criticality":2,"criticality_description":"Highly critical","solution_status":1,"solution_status_description":"Unpatched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:U/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-13T11:32:31Z","pretty_id":61,"custom_score":null,"last_updated":"2016-10-13T12:16:39Z"},{"id":384395,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":null,"advisory":{"id":193122,"advisory_identifier":"SA72145","title":"Palo Alto Networks PAN-OS Multiple Vulnerabilities","released":"2016-08-16T14:42:05Z","modified_date":"2016-10-12T13:33:38Z","criticality":2,"criticality_description":"Highly critical","solution_status":1,"solution_status_description":"Unpatched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:U/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-12T13:37:12Z","pretty_id":60,"custom_score":null,"last_updated":"2016-12-15T17:58:44Z"},{"id":384394,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2864,"name":"Low"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":null,"advisory":{"id":195494,"advisory_identifier":"SA73047","title":"Palo Alto Networks PAN-OS Multiple Vulnerabilities","released":"2016-10-12T13:33:30Z","modified_date":"2016-11-18T15:06:52Z","criticality":3,"criticality_description":"Moderately critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":8.3,"cvss_vector":"(AV:A/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-12T13:27:21Z","pretty_id":59,"custom_score":null,"last_updated":"2016-12-15T17:58:44Z"},{"id":384392,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":null,"advisory":{"id":195497,"advisory_identifier":"SA73048","title":"Palo Alto PAN-OS Denial of Service Vulnerabilities","released":"2016-10-12T13:34:07Z","modified_date":"2016-10-12T13:34:07Z","criticality":3,"criticality_description":"Moderately critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":7.8,"cvss_vector":"(AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-12T13:16:19Z","pretty_id":58,"custom_score":null,"last_updated":"2016-12-15T17:58:43Z"},{"id":384389,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":null,"advisory":{"id":195500,"advisory_identifier":"SA73049","title":"Palo Alto Networks PAN-OS Multiple Vulnerabilities","released":"2016-10-12T13:34:15Z","modified_date":"2016-11-21T14:05:00Z","criticality":2,"criticality_description":"Highly critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-12T12:53:45Z","pretty_id":57,"custom_score":null,"last_updated":"2016-12-15T17:58:43Z"},{"id":384387,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":null,"advisory":{"id":195506,"advisory_identifier":"SA73064","title":"Palo Alto Networks PAN-OS Multiple Vulnerabilities","released":"2016-10-12T13:34:22Z","modified_date":"2016-11-18T15:06:49Z","criticality":3,"criticality_description":"Moderately critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":8.3,"cvss_vector":"(AV:A/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-12T12:47:19Z","pretty_id":56,"custom_score":null,"last_updated":"2016-12-15T17:58:43Z"},{"id":384307,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":null,"advisory":{"id":195467,"advisory_identifier":"SA72999","title":"VMware vRealize Operations Manager (vROps) Security Bypass Vulnerability","released":"2016-10-12T10:59:50Z","modified_date":"2016-11-16T12:35:58Z","criticality":4,"criticality_description":"Less critical","solution_status":2,"solution_status_description":"Vendor Patched","where":2,"where_description":"From local network","cvss_score":7.7,"cvss_vector":"(AV:A/AC:L/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-12T12:23:31Z","pretty_id":55,"custom_score":null,"last_updated":"2016-12-15T17:58:43Z"},{"id":377026,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2430,"username":"user6@company.com"},"asset_list":{"id":4617,"name":"Windows Server (IT-DTS)"},"advisory":{"id":195447,"advisory_identifier":"SA72977","title":"Microsoft Products Multiple Vulnerabilities","released":"2016-10-11T20:51:13Z","modified_date":"2016-10-21T13:40:48Z","criticality":1,"criticality_description":"Extremely critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:H/RL:OF/RC:C)","type":0,"is_zero_day":true},"created":"2016-10-11T19:29:38Z","pretty_id":54,"custom_score":null,"last_updated":"2016-10-12T13:55:41Z"},{"id":377024,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2430,"username":"user6@company.com"},"asset_list":null,"advisory":{"id":195447,"advisory_identifier":"SA72977","title":"Microsoft Products Multiple Vulnerabilities","released":"2016-10-11T20:51:13Z","modified_date":"2016-10-21T13:40:48Z","criticality":1,"criticality_description":"Extremely critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:H/RL:OF/RC:C)","type":0,"is_zero_day":true},"created":"2016-10-11T19:29:24Z","pretty_id":53,"custom_score":null,"last_updated":"2016-10-12T13:55:20Z"},{"id":377021,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2430,"username":"user6@company.com"},"asset_list":{"id":4649,"name":"Desktop Software"},"advisory":{"id":195447,"advisory_identifier":"SA72977","title":"Microsoft Products Multiple Vulnerabilities","released":"2016-10-11T20:51:13Z","modified_date":"2016-10-21T13:40:48Z","criticality":1,"criticality_description":"Extremely critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:H/RL:OF/RC:C)","type":0,"is_zero_day":true},"created":"2016-10-11T19:29:12Z","pretty_id":52,"custom_score":null,"last_updated":"2016-10-12T13:54:36Z"},{"id":377019,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2430,"username":"user6@company.com"},"asset_list":{"id":4617,"name":"Windows Server (IT-DTS)"},"advisory":{"id":195450,"advisory_identifier":"SA72988","title":"Microsoft Windows Multiple Privilege Escalation Vulnerabilities","released":"2016-10-11T20:51:38Z","modified_date":"2016-10-21T13:41:59Z","criticality":4,"criticality_description":"Less critical","solution_status":2,"solution_status_description":"Vendor Patched","where":3,"where_description":"Local system","cvss_score":6.8,"cvss_vector":"(AV:L/AC:L/Au:S/C:C/I:C/A:C/E:F/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-11T19:28:56Z","pretty_id":51,"custom_score":null,"last_updated":"2016-10-12T13:53:51Z"},{"id":377017,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2430,"username":"user6@company.com"},"asset_list":null,"advisory":{"id":195450,"advisory_identifier":"SA72988","title":"Microsoft Windows Multiple Privilege Escalation Vulnerabilities","released":"2016-10-11T20:51:38Z","modified_date":"2016-10-21T13:41:59Z","criticality":4,"criticality_description":"Less critical","solution_status":2,"solution_status_description":"Vendor Patched","where":3,"where_description":"Local system","cvss_score":6.8,"cvss_vector":"(AV:L/AC:L/Au:S/C:C/I:C/A:C/E:F/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-11T19:28:42Z","pretty_id":50,"custom_score":null,"last_updated":"2016-10-12T13:53:37Z"}]}
  2. {"count":66,"next":"https://api.app.secunia.com/api/tickets/?page=3","previous":"https://api.app.secunia.com/api/tickets/","results":[{"id":377015,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2864,"name":"Low"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2430,"username":"user6@company.com"},"asset_list":{"id":4617,"name":"Windows Server (IT-DTS)"},"advisory":{"id":195453,"advisory_identifier":"SA72990","title":"Microsoft Windows Kernel Multiple Vulnerabilities","released":"2016-10-11T20:54:42Z","modified_date":"2016-10-25T12:34:19Z","criticality":4,"criticality_description":"Less critical","solution_status":2,"solution_status_description":"Vendor Patched","where":3,"where_description":"Local system","cvss_score":6.8,"cvss_vector":"(AV:L/AC:L/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-11T19:28:28Z","pretty_id":49,"custom_score":null,"last_updated":"2016-10-12T13:56:13Z"},{"id":377012,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2864,"name":"Low"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2430,"username":"user6@company.com"},"asset_list":null,"advisory":{"id":195453,"advisory_identifier":"SA72990","title":"Microsoft Windows Kernel Multiple Vulnerabilities","released":"2016-10-11T20:54:42Z","modified_date":"2016-10-25T12:34:19Z","criticality":4,"criticality_description":"Less critical","solution_status":2,"solution_status_description":"Vendor Patched","where":3,"where_description":"Local system","cvss_score":6.8,"cvss_vector":"(AV:L/AC:L/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-11T19:28:15Z","pretty_id":48,"custom_score":null,"last_updated":"2016-10-12T13:56:25Z"},{"id":377009,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2430,"username":"user6@company.com"},"asset_list":{"id":4617,"name":"Windows Server (IT-DTS)"},"advisory":{"id":195456,"advisory_identifier":"SA72996","title":"Microsoft Windows Flash Player Multiple Vulnerabilities","released":"2016-10-11T20:55:43Z","modified_date":"2016-10-11T20:55:43Z","criticality":2,"criticality_description":"Highly critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-11T19:28:00Z","pretty_id":47,"custom_score":null,"last_updated":"2016-10-12T13:56:35Z"},{"id":377007,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2430,"username":"user6@company.com"},"asset_list":null,"advisory":{"id":195456,"advisory_identifier":"SA72996","title":"Microsoft Windows Flash Player Multiple Vulnerabilities","released":"2016-10-11T20:55:43Z","modified_date":"2016-10-11T20:55:43Z","criticality":2,"criticality_description":"Highly critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-11T19:27:47Z","pretty_id":46,"custom_score":null,"last_updated":"2016-10-12T13:56:44Z"},{"id":377004,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2430,"username":"user6@company.com"},"asset_list":{"id":4649,"name":"Desktop Software"},"advisory":{"id":195459,"advisory_identifier":"SA72985","title":"Microsoft Multiple Products RTF Memory Corruption Vulnerability","released":"2016-10-11T21:03:39Z","modified_date":"2016-10-11T21:03:39Z","criticality":1,"criticality_description":"Extremely critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:H/RL:OF/RC:C)","type":0,"is_zero_day":true},"created":"2016-10-11T19:27:33Z","pretty_id":45,"custom_score":null,"last_updated":"2016-10-12T13:57:08Z"},{"id":375969,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2430,"username":"user6@company.com"},"asset_list":null,"advisory":{"id":195436,"advisory_identifier":"SA72987","title":"Microsoft Windows Microsoft Video Control Code Execution Vulnerability","released":"2016-10-11T20:21:38Z","modified_date":"2016-10-11T20:21:38Z","criticality":2,"criticality_description":"Highly critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-11T18:53:00Z","pretty_id":44,"custom_score":null,"last_updated":"2016-10-12T13:57:17Z"},{"id":375967,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2430,"username":"user6@company.com"},"asset_list":{"id":4617,"name":"Windows Server (IT-DTS)"},"advisory":{"id":195444,"advisory_identifier":"SA72995","title":"Microsoft Windows Internet Messaging API Information Disclosure Vulnerability","released":"2016-10-11T20:40:24Z","modified_date":"2016-10-11T20:40:24Z","criticality":3,"criticality_description":"Moderately critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":5.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:P/I:N/A:N/E:F/RL:OF/RC:C)","type":0,"is_zero_day":true},"created":"2016-10-11T18:52:56Z","pretty_id":43,"custom_score":null,"last_updated":"2016-10-12T13:57:26Z"},{"id":375964,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2430,"username":"user6@company.com"},"asset_list":null,"advisory":{"id":195444,"advisory_identifier":"SA72995","title":"Microsoft Windows Internet Messaging API Information Disclosure Vulnerability","released":"2016-10-11T20:40:24Z","modified_date":"2016-10-11T20:40:24Z","criticality":3,"criticality_description":"Moderately critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":5.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:P/I:N/A:N/E:F/RL:OF/RC:C)","type":0,"is_zero_day":true},"created":"2016-10-11T18:52:53Z","pretty_id":42,"custom_score":null,"last_updated":"2016-10-12T13:57:37Z"},{"id":375344,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2430,"username":"user6@company.com"},"asset_list":null,"advisory":{"id":195435,"advisory_identifier":"SA72994","title":"Microsoft Windows Diagnostics Hub Standard Collector Service Privilege Escalation Vulnerability","released":"2016-10-11T19:42:25Z","modified_date":"2016-10-18T12:03:09Z","criticality":4,"criticality_description":"Less critical","solution_status":2,"solution_status_description":"Vendor Patched","where":3,"where_description":"Local system","cvss_score":6.8,"cvss_vector":"(AV:L/AC:L/Au:S/C:C/I:C/A:C/E:H/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-11T18:24:00Z","pretty_id":41,"custom_score":null,"last_updated":"2016-10-12T13:57:50Z"},{"id":375244,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2864,"name":"Low"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4657,"name":"PSS Middleware Environment"},"advisory":{"id":195378,"advisory_identifier":"SA72899","title":"Red Hat update for kernel","released":"2016-10-11T16:49:35Z","modified_date":"2016-10-11T16:49:35Z","criticality":4,"criticality_description":"Less critical","solution_status":2,"solution_status_description":"Vendor Patched","where":2,"where_description":"From local network","cvss_score":6.1,"cvss_vector":"(AV:A/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-11T16:59:32Z","pretty_id":40,"custom_score":null,"last_updated":"2016-12-15T17:58:43Z"},{"id":375241,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4657,"name":"PSS Middleware Environment"},"advisory":{"id":195381,"advisory_identifier":"SA72906","title":"Red Hat update for tomcat","released":"2016-10-11T16:49:47Z","modified_date":"2016-10-11T16:49:47Z","criticality":3,"criticality_description":"Moderately critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":9.3,"cvss_vector":"(AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-11T16:59:13Z","pretty_id":39,"custom_score":null,"last_updated":"2016-12-15T17:58:43Z"},{"id":375238,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4657,"name":"PSS Middleware Environment"},"advisory":{"id":195384,"advisory_identifier":"SA72910","title":"Red Hat update for tomcat6","released":"2016-10-11T16:50:19Z","modified_date":"2016-10-11T16:50:19Z","criticality":3,"criticality_description":"Moderately critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":7.5,"cvss_vector":"(AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-11T16:58:54Z","pretty_id":38,"custom_score":null,"last_updated":"2016-12-15T17:58:43Z"},{"id":375236,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2449,"username":"user7@company.com"},"asset_list":{"id":4649,"name":"Desktop Software"},"advisory":{"id":195422,"advisory_identifier":"SA72950","title":"Adobe Flash Player Multiple Vulnerabilities","released":"2016-10-11T17:43:27Z","modified_date":"2016-10-13T19:01:37Z","criticality":2,"criticality_description":"Highly critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-11T16:52:56Z","pretty_id":37,"custom_score":null,"last_updated":"2016-10-11T19:29:57Z"},{"id":375233,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2449,"username":"user7@company.com"},"asset_list":{"id":4649,"name":"Desktop Software"},"advisory":{"id":195426,"advisory_identifier":"SA72948","title":"Adobe Reader / Acrobat Multiple Vulnerabilities","released":"2016-10-11T17:52:31Z","modified_date":"2016-11-15T15:46:54Z","criticality":2,"criticality_description":"Highly critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-11T16:52:38Z","pretty_id":36,"custom_score":null,"last_updated":"2016-10-11T19:29:38Z"},{"id":373559,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4772,"name":"Datacom"},"advisory":{"id":195151,"advisory_identifier":"SA72869","title":"Cisco Multiple Nexus Series Switches NX-OS Border Gateway Protocol Denial of Service Vulnerability","released":"2016-10-06T15:42:09Z","modified_date":"2016-10-06T15:42:09Z","criticality":5,"criticality_description":"Not critical","solution_status":4,"solution_status_description":"Partial Fix","where":2,"where_description":"From local network","cvss_score":5.7,"cvss_vector":"(AV:A/AC:M/Au:N/C:N/I:N/A:C/E:U/RL:TF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-10T13:39:21Z","pretty_id":35,"custom_score":null,"last_updated":"2016-12-15T17:58:43Z"},{"id":373556,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4772,"name":"Datacom"},"advisory":{"id":195154,"advisory_identifier":"SA72870","title":"Cisco Multiple Nexus Series Switches NX-OS DHCP Denial of Service Vulnerability","released":"2016-10-06T15:42:37Z","modified_date":"2016-10-06T15:42:37Z","criticality":4,"criticality_description":"Less critical","solution_status":4,"solution_status_description":"Partial Fix","where":2,"where_description":"From local network","cvss_score":6.1,"cvss_vector":"(AV:A/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:TF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-10T13:23:15Z","pretty_id":34,"custom_score":null,"last_updated":"2016-12-15T17:58:42Z"},{"id":373374,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4772,"name":"Datacom"},"advisory":{"id":195157,"advisory_identifier":"SA72874","title":"Cisco Multiple Nexus Series Switches NX-OS DHCP Denial of Service Vulnerability","released":"2016-10-06T15:42:55Z","modified_date":"2016-10-06T15:42:55Z","criticality":4,"criticality_description":"Less critical","solution_status":4,"solution_status_description":"Partial Fix","where":2,"where_description":"From local network","cvss_score":6.1,"cvss_vector":"(AV:A/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:TF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-10T13:13:22Z","pretty_id":33,"custom_score":null,"last_updated":"2016-12-15T17:58:42Z"},{"id":373372,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4772,"name":"Datacom"},"advisory":{"id":195160,"advisory_identifier":"SA72879","title":"Cisco Multiple Nexus Series Switches NX-OS Security Bypass Vulnerability","released":"2016-10-06T15:43:16Z","modified_date":"2016-10-06T15:43:16Z","criticality":4,"criticality_description":"Less critical","solution_status":4,"solution_status_description":"Partial Fix","where":2,"where_description":"From local network","cvss_score":7.7,"cvss_vector":"(AV:A/AC:L/Au:S/C:C/I:C/A:C/E:U/RL:TF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-10T13:02:09Z","pretty_id":32,"custom_score":null,"last_updated":"2016-12-15T17:58:42Z"},{"id":372658,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4772,"name":"Datacom"},"advisory":{"id":195166,"advisory_identifier":"SA72964","title":"Cisco Catalyst 6500 Series Switches / 7600 Series Routers IOS Security Bypass Vulnerability","released":"2016-10-06T15:44:12Z","modified_date":"2016-10-06T15:44:12Z","criticality":3,"criticality_description":"Moderately critical","solution_status":1,"solution_status_description":"Unpatched","where":1,"where_description":"From remote","cvss_score":5.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:N/I:P/A:N/E:U/RL:U/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-07T15:03:36Z","pretty_id":31,"custom_score":null,"last_updated":"2016-12-15T17:58:42Z"},{"id":372657,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4772,"name":"Datacom"},"advisory":{"id":195169,"advisory_identifier":"SA72973","title":"Cisco Adaptive Security Appliance (ASA) DHCP Relay Denial of Service Vulnerability","released":"2016-10-06T15:44:20Z","modified_date":"2016-10-06T15:44:20Z","criticality":4,"criticality_description":"Less critical","solution_status":4,"solution_status_description":"Partial Fix","where":2,"where_description":"From local network","cvss_score":6.1,"cvss_vector":"(AV:A/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:TF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-07T14:53:39Z","pretty_id":30,"custom_score":null,"last_updated":"2016-12-15T17:58:42Z"}]}
  3. {"count":66,"next":"https://api.app.secunia.com/api/tickets/?page=4","previous":"https://api.app.secunia.com/api/tickets/?page=2","results":[{"id":372656,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2873,"name":"Urgent"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4772,"name":"Datacom"},"advisory":{"id":195175,"advisory_identifier":"SA72889","title":"Cisco Nexus 7000 Series Switches NX-OS OTV Buffer Overflow Vulnerability","released":"2016-10-06T17:42:01Z","modified_date":"2016-10-06T17:42:01Z","criticality":3,"criticality_description":"Moderately critical","solution_status":4,"solution_status_description":"Partial Fix","where":2,"where_description":"From local network","cvss_score":8.3,"cvss_vector":"(AV:A/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:TF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-07T14:48:28Z","pretty_id":29,"custom_score":null,"last_updated":"2016-10-07T14:48:28Z"},{"id":372654,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":null,"advisory":{"id":195251,"advisory_identifier":"SA72896","title":"VMware Horizon View Connection Server Directory Traversal Vulnerability","released":"2016-10-07T14:01:48Z","modified_date":"2016-10-12T11:00:55Z","criticality":4,"criticality_description":"Less critical","solution_status":2,"solution_status_description":"Vendor Patched","where":2,"where_description":"From local network","cvss_score":3.3,"cvss_vector":"(AV:A/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-07T13:55:40Z","pretty_id":28,"custom_score":null,"last_updated":"2016-12-15T17:58:42Z"},{"id":324008,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4659,"name":"Security Engineer Apps"},"advisory":{"id":195040,"advisory_identifier":"SA72844","title":"Pulse Connect Secure OpenSSL Multiple Denial of Service Vulnerabilities","released":"2016-10-05T11:45:15Z","modified_date":"2016-10-05T11:45:15Z","criticality":3,"criticality_description":"Moderately critical","solution_status":1,"solution_status_description":"Unpatched","where":1,"where_description":"From remote","cvss_score":7.8,"cvss_vector":"(AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:U/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-05T17:55:42Z","pretty_id":26,"custom_score":null,"last_updated":"2016-12-15T17:58:41Z"},{"id":324005,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4659,"name":"Security Engineer Apps"},"advisory":{"id":195046,"advisory_identifier":"SA72926","title":"Pulse Secure Network Connect OpenSSL SHA512 Denial of Service Vulnerability","released":"2016-10-05T11:45:22Z","modified_date":"2016-10-05T11:45:22Z","criticality":3,"criticality_description":"Moderately critical","solution_status":1,"solution_status_description":"Unpatched","where":1,"where_description":"From remote","cvss_score":7.8,"cvss_vector":"(AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:U/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-05T17:55:18Z","pretty_id":25,"custom_score":null,"last_updated":"2016-12-15T17:58:41Z"},{"id":324004,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4657,"name":"PSS Middleware Environment"},"advisory":{"id":195049,"advisory_identifier":"SA72821","title":"Red Hat update for kernel","released":"2016-10-05T11:51:34Z","modified_date":"2016-10-05T11:51:34Z","criticality":4,"criticality_description":"Less critical","solution_status":2,"solution_status_description":"Vendor Patched","where":3,"where_description":"Local system","cvss_score":6.8,"cvss_vector":"(AV:L/AC:L/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-05T17:50:29Z","pretty_id":24,"custom_score":null,"last_updated":"2016-12-15T17:58:41Z"},{"id":322427,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4649,"name":"Desktop Software"},"advisory":{"id":194748,"advisory_identifier":"SA72789","title":"Cisco Multiple Products OpenSSL Multiple Vulnerabilities","released":"2016-09-28T13:26:11Z","modified_date":"2016-09-28T13:26:11Z","criticality":3,"criticality_description":"Moderately critical","solution_status":1,"solution_status_description":"Unpatched","where":1,"where_description":"From remote","cvss_score":7.8,"cvss_vector":"(AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:U/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-04T16:39:51Z","pretty_id":23,"custom_score":null,"last_updated":"2016-12-15T17:58:41Z"},{"id":322415,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4772,"name":"Datacom"},"advisory":{"id":194824,"advisory_identifier":"SA72790","title":"Cisco IOS XE Network Address Translation (NAT) Denial of Service Vulnerability","released":"2016-09-29T14:46:30Z","modified_date":"2016-09-29T14:46:30Z","criticality":4,"criticality_description":"Less critical","solution_status":2,"solution_status_description":"Vendor Patched","where":2,"where_description":"From local network","cvss_score":6.1,"cvss_vector":"(AV:A/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-04T16:34:07Z","pretty_id":22,"custom_score":null,"last_updated":"2016-12-15T17:58:41Z"},{"id":321988,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4772,"name":"Datacom"},"advisory":{"id":194846,"advisory_identifier":"SA72793","title":"Cisco IOS / IOS XE AAA Service Denial of Service Vulnerability","released":"2016-09-29T15:36:33Z","modified_date":"2016-09-29T15:36:33Z","criticality":4,"criticality_description":"Less critical","solution_status":2,"solution_status_description":"Vendor Patched","where":2,"where_description":"From local network","cvss_score":6.1,"cvss_vector":"(AV:A/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-04T15:16:32Z","pretty_id":21,"custom_score":null,"last_updated":"2016-12-15T17:58:41Z"},{"id":321986,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4772,"name":"Datacom"},"advisory":{"id":194859,"advisory_identifier":"SA72755","title":"Cisco IOS / IOS XE Smart Install Memory Leak Vulnerability","released":"2016-09-29T15:55:21Z","modified_date":"2016-09-29T15:55:21Z","criticality":4,"criticality_description":"Less critical","solution_status":2,"solution_status_description":"Vendor Patched","where":2,"where_description":"From local network","cvss_score":6.1,"cvss_vector":"(AV:A/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-04T15:11:11Z","pretty_id":20,"custom_score":null,"last_updated":"2016-12-15T17:58:41Z"},{"id":321985,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4772,"name":"Datacom"},"advisory":{"id":194862,"advisory_identifier":"SA72756","title":"Cisco IOS / IOS XE Multiple Denial of Service Vulnerabilities","released":"2016-09-29T15:56:44Z","modified_date":"2016-09-29T15:56:44Z","criticality":3,"criticality_description":"Moderately critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":7.8,"cvss_vector":"(AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-04T15:06:13Z","pretty_id":19,"custom_score":null,"last_updated":"2016-12-15T17:58:40Z"},{"id":321983,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4772,"name":"Datacom"},"advisory":{"id":194865,"advisory_identifier":"SA72757","title":"Cisco IOS / IOS XE IP Detail Record Denial of Service Vulnerability","released":"2016-09-29T15:57:26Z","modified_date":"2016-09-29T15:57:26Z","criticality":4,"criticality_description":"Less critical","solution_status":2,"solution_status_description":"Vendor Patched","where":2,"where_description":"From local network","cvss_score":6.1,"cvss_vector":"(AV:A/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-04T15:00:44Z","pretty_id":18,"custom_score":null,"last_updated":"2016-12-15T17:58:40Z"},{"id":321980,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4772,"name":"Datacom"},"advisory":{"id":194880,"advisory_identifier":"SA72773","title":"Cisco Multiple Products IP Fragment Reassembly Denial of Service Vulnerability","released":"2016-09-29T17:14:35Z","modified_date":"2016-09-29T17:14:35Z","criticality":3,"criticality_description":"Moderately critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":7.8,"cvss_vector":"(AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-04T14:51:52Z","pretty_id":17,"custom_score":null,"last_updated":"2016-12-15T17:58:40Z"},{"id":321977,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4772,"name":"Datacom"},"advisory":{"id":194883,"advisory_identifier":"SA72792","title":"Cisco IOS DNS Forwarder Vulnerability","released":"2016-09-29T17:16:12Z","modified_date":"2016-09-29T17:16:12Z","criticality":3,"criticality_description":"Moderately critical","solution_status":2,"solution_status_description":"Vendor Patched","where":2,"where_description":"From local network","cvss_score":7.3,"cvss_vector":"(AV:A/AC:L/Au:N/C:P/I:P/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-04T14:45:04Z","pretty_id":16,"custom_score":null,"last_updated":"2016-12-15T17:58:40Z"},{"id":321974,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":null,"advisory":{"id":194976,"advisory_identifier":"SA72876","title":"Palo Alto PAN-OS Denial of Service Vulnerabilities","released":"2016-10-04T15:04:11Z","modified_date":"2016-11-01T14:25:00Z","criticality":3,"criticality_description":"Moderately critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":7.8,"cvss_vector":"(AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-04T14:37:42Z","pretty_id":15,"custom_score":null,"last_updated":"2016-12-15T17:58:40Z"},{"id":321971,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4657,"name":"PSS Middleware Environment"},"advisory":{"id":194980,"advisory_identifier":"SA72720","title":"Red Hat update for thunderbird","released":"2016-10-04T15:35:38Z","modified_date":"2016-10-04T15:35:38Z","criticality":2,"criticality_description":"Highly critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-04T14:19:34Z","pretty_id":14,"custom_score":null,"last_updated":"2016-12-15T17:58:40Z"},{"id":321345,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4657,"name":"PSS Middleware Environment"},"advisory":{"id":191968,"advisory_identifier":"SA71733","title":"Oracle Solaris Multiple Third Party Components Multiple Vulnerabilities","released":"2016-07-20T17:16:10Z","modified_date":"2017-02-13T12:45:36Z","criticality":2,"criticality_description":"Highly critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-04T12:28:40Z","pretty_id":13,"custom_score":null,"last_updated":"2016-12-15T17:58:40Z"},{"id":321344,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4657,"name":"PSS Middleware Environment"},"advisory":{"id":194898,"advisory_identifier":"SA72713","title":"Red Hat update for python-twisted-web","released":"2016-09-30T11:35:57Z","modified_date":"2016-09-30T11:35:57Z","criticality":3,"criticality_description":"Moderately critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":7.5,"cvss_vector":"(AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-04T12:23:46Z","pretty_id":12,"custom_score":null,"last_updated":"2016-12-15T17:58:40Z"},{"id":321341,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4657,"name":"PSS Middleware Environment"},"advisory":{"id":194807,"advisory_identifier":"SA72627","title":"Red Hat update for bind97","released":"2016-09-29T12:09:41Z","modified_date":"2016-09-29T12:09:41Z","criticality":3,"criticality_description":"Moderately critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":7.8,"cvss_vector":"(AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-04T12:22:52Z","pretty_id":11,"custom_score":null,"last_updated":"2016-12-15T17:58:39Z"},{"id":321338,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4657,"name":"PSS Middleware Environment"},"advisory":{"id":194810,"advisory_identifier":"SA72728","title":"Red Hat update for bind","released":"2016-09-29T12:09:56Z","modified_date":"2016-09-29T12:09:56Z","criticality":3,"criticality_description":"Moderately critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":7.8,"cvss_vector":"(AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-04T12:22:03Z","pretty_id":10,"custom_score":null,"last_updated":"2016-12-15T17:58:39Z"},{"id":321337,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4657,"name":"PSS Middleware Environment"},"advisory":{"id":194722,"advisory_identifier":"SA72635","title":"Red Hat update for openssl","released":"2016-09-28T12:39:51Z","modified_date":"2016-10-17T14:44:11Z","criticality":3,"criticality_description":"Moderately critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":7.8,"cvss_vector":"(AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-04T12:20:56Z","pretty_id":9,"custom_score":null,"last_updated":"2016-12-15T17:58:39Z"}]}
  4. {"count":66,"next":null,"previous":"https://api.app.secunia.com/api/tickets/?page=3","results":[{"id":321230,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2449,"username":"user7@company.com"},"asset_list":{"id":4649,"name":"Desktop Software"},"advisory":{"id":194895,"advisory_identifier":"SA72819","title":"Google Chrome Multiple Vulnerabilities","released":"2016-09-30T09:28:56Z","modified_date":"2016-09-30T09:28:56Z","criticality":2,"criticality_description":"Highly critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-03T19:05:01Z","pretty_id":8,"custom_score":null,"last_updated":"2016-10-04T13:00:05Z"},{"id":312852,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2449,"username":"user7@company.com"},"asset_list":{"id":4649,"name":"Desktop Software"},"advisory":{"id":194394,"advisory_identifier":"SA72600","title":"Apple Safari Multiple Vulnerabilities","released":"2016-09-21T11:29:26Z","modified_date":"2016-09-28T14:38:09Z","criticality":2,"criticality_description":"Highly critical","solution_status":1,"solution_status_description":"Unpatched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:U/RC:C)","type":0,"is_zero_day":false},"created":"2016-09-21T11:32:38Z","pretty_id":5,"custom_score":null,"last_updated":"2016-09-21T12:02:31Z"},{"id":312849,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4657,"name":"PSS Middleware Environment"},"advisory":{"id":194406,"advisory_identifier":"SA72669","title":"Red Hat update for firefox","released":"2016-09-21T12:59:46Z","modified_date":"2016-09-21T12:59:46Z","criticality":2,"criticality_description":"Highly critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-09-21T11:25:50Z","pretty_id":4,"custom_score":null,"last_updated":"2016-12-15T17:58:39Z"},{"id":312301,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4659,"name":"Security Engineer Apps"},"advisory":{"id":194372,"advisory_identifier":"SA72624","title":"Symantec Multiple Products Decomposer Engine RAR Multiple Vulnerabilities","released":"2016-09-20T15:08:36Z","modified_date":"2016-09-23T09:53:20Z","criticality":2,"criticality_description":"Highly critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-09-20T13:35:35Z","pretty_id":3,"custom_score":null,"last_updated":"2016-12-15T17:58:39Z"},{"id":288866,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":null,"advisory":{"id":192618,"advisory_identifier":"SA71966","title":"VMware Multiple Products vmhgfs.dll Insecure Library Loading Vulnerability","released":"2016-08-05T12:47:58Z","modified_date":"2016-09-20T12:04:25Z","criticality":2,"criticality_description":"Highly critical","solution_status":4,"solution_status_description":"Partial Fix","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:TF/RC:C)","type":0,"is_zero_day":false},"created":"2016-09-20T10:13:19Z","pretty_id":2,"custom_score":null,"last_updated":"2016-12-15T17:58:39Z"},{"id":288853,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4649,"name":"Desktop Software"},"advisory":{"id":192876,"advisory_identifier":"SA72101","title":"Pulse Connect Secure / Policy Secure Samba Multiple Vulnerabilities","released":"2016-08-11T16:15:46Z","modified_date":"2017-02-13T13:28:44Z","criticality":3,"criticality_description":"Moderately critical","solution_status":4,"solution_status_description":"Partial Fix","where":2,"where_description":"From local network","cvss_score":8.3,"cvss_vector":"(AV:A/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:TF/RC:C)","type":0,"is_zero_day":false},"created":"2016-09-19T14:03:22Z","pretty_id":1,"custom_score":null,"last_updated":"2017-02-28T17:57:11Z"}]}
  5. {"count":66,"next":"https://api.app.secunia.com/api/tickets/?page=2","previous":null,"results":[{"id":592594,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2864,"name":"Low"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":null,"advisory":{"id":199009,"advisory_identifier":"SA74347","title":"VMware ESXi Script Insertion Vulnerability","released":"2016-12-21T22:28:44Z","modified_date":"2016-12-21T22:28:44Z","criticality":4,"criticality_description":"Less critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":4.3,"cvss_vector":"(AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-12-29T19:10:08Z","pretty_id":89,"custom_score":null,"last_updated":"2017-02-28T17:56:19Z"},{"id":588699,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2873,"name":"Urgent"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":4120,"username":"user4@company.com"},"asset_list":{"id":4777,"name":"Info Security Threat_Splunk"},"advisory":{"id":199003,"advisory_identifier":"SA74447","title":"Blue Coat Security Analytics Multiple Vulnerabilities","released":"2016-12-21T15:24:53Z","modified_date":"2016-12-21T15:24:53Z","criticality":2,"criticality_description":"Highly critical","solution_status":4,"solution_status_description":"Partial Fix","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:TF/RC:C)","type":0,"is_zero_day":false},"created":"2016-12-21T15:33:09Z","pretty_id":79,"custom_score":null,"last_updated":"2016-12-21T15:40:28Z"},{"id":584252,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2873,"name":"Urgent"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":4118,"username":"user3@company.com"},"asset_list":{"id":4657,"name":"PSS Middleware Environment"},"advisory":{"id":195840,"advisory_identifier":"SA73221","title":"Oracle Solaris Multiple Third Party Components Multiple Vulnerabilities","released":"2016-10-19T14:20:02Z","modified_date":"2016-12-19T14:42:30Z","criticality":2,"criticality_description":"Highly critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-12-20T13:43:24Z","pretty_id":76,"custom_score":null,"last_updated":"2017-01-11T19:47:09Z"},{"id":582514,"name":null,"status":{"id":2957,"name":"Open"},"priority":{"id":2864,"name":"Low"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":4030,"username":"user5@company.com"},"asset_list":{"id":4777,"name":"Info Security Threat_Splunk"},"advisory":{"id":198438,"advisory_identifier":"SA74209","title":"Blue Coat Security Analytics / Malware Analysis Appliance Multiple Vulnerabilities","released":"2016-12-09T16:21:06Z","modified_date":"2017-03-10T13:47:09Z","criticality":4,"criticality_description":"Less critical","solution_status":4,"solution_status_description":"Partial Fix","where":2,"where_description":"From local network","cvss_score":6.8,"cvss_vector":"(AV:L/AC:L/Au:S/C:C/I:C/A:C/E:U/RL:TF/RC:C)","type":0,"is_zero_day":false},"created":"2016-12-16T12:54:27Z","pretty_id":74,"custom_score":null,"last_updated":"2017-03-10T12:54:11Z"},{"id":576115,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2451,"username":"user2@company.com"},"asset_list":{"id":4649,"name":"Desktop Software"},"advisory":{"id":198595,"advisory_identifier":"SA74176","title":"Adobe Flash Player Multiple Vulnerabilities","released":"2016-12-13T18:09:21Z","modified_date":"2016-12-20T11:12:34Z","criticality":1,"criticality_description":"Extremely critical","solution_status":1,"solution_status_description":"Unpatched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:H/RL:U/RC:C)","type":0,"is_zero_day":true},"created":"2016-12-13T17:59:48Z","pretty_id":65,"custom_score":null,"last_updated":"2016-12-13T18:17:46Z"},{"id":385461,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4772,"name":"Datacom"},"advisory":{"id":195581,"advisory_identifier":"SA73087","title":"Cisco Unified Communications Manager Clickjacking Vulnerability","released":"2016-10-13T17:24:11Z","modified_date":"2016-10-13T17:24:11Z","criticality":4,"criticality_description":"Less critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":4.3,"cvss_vector":"(AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-13T16:40:45Z","pretty_id":64,"custom_score":null,"last_updated":"2016-12-15T17:58:44Z"},{"id":385458,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2864,"name":"Low"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2430,"username":"user6@company.com"},"asset_list":{"id":4617,"name":"Windows Server (IT-DTS)"},"advisory":{"id":192775,"advisory_identifier":"SA72020","title":"Microsoft Windows Multiple Security Bypass Vulnerabilities","released":"2016-08-09T20:44:12Z","modified_date":"2016-10-13T16:47:52Z","criticality":5,"criticality_description":"Not critical","solution_status":2,"solution_status_description":"Vendor Patched","where":2,"where_description":"From local network","cvss_score":5.4,"cvss_vector":"(AV:A/AC:M/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-13T16:29:35Z","pretty_id":63,"custom_score":null,"last_updated":"2016-12-15T20:08:34Z"},{"id":385456,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2864,"name":"Low"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2430,"username":"user6@company.com"},"asset_list":null,"advisory":{"id":192775,"advisory_identifier":"SA72020","title":"Microsoft Windows Multiple Security Bypass Vulnerabilities","released":"2016-08-09T20:44:12Z","modified_date":"2016-10-13T16:47:52Z","criticality":5,"criticality_description":"Not critical","solution_status":2,"solution_status_description":"Vendor Patched","where":2,"where_description":"From local network","cvss_score":5.4,"cvss_vector":"(AV:A/AC:M/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-13T16:29:15Z","pretty_id":62,"custom_score":null,"last_updated":"2016-12-15T20:08:33Z"},{"id":384586,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2451,"username":"user2@company.com"},"asset_list":{"id":4649,"name":"Desktop Software"},"advisory":{"id":195525,"advisory_identifier":"SA73061","title":"Google Chrome Multiple Vulnerabilities","released":"2016-10-13T09:54:04Z","modified_date":"2016-10-13T09:54:04Z","criticality":2,"criticality_description":"Highly critical","solution_status":1,"solution_status_description":"Unpatched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:U/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-13T11:32:31Z","pretty_id":61,"custom_score":null,"last_updated":"2016-10-13T12:16:39Z"},{"id":384395,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":null,"advisory":{"id":193122,"advisory_identifier":"SA72145","title":"Palo Alto Networks PAN-OS Multiple Vulnerabilities","released":"2016-08-16T14:42:05Z","modified_date":"2016-10-12T13:33:38Z","criticality":2,"criticality_description":"Highly critical","solution_status":1,"solution_status_description":"Unpatched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:U/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-12T13:37:12Z","pretty_id":60,"custom_score":null,"last_updated":"2016-12-15T17:58:44Z"},{"id":384394,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2864,"name":"Low"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":null,"advisory":{"id":195494,"advisory_identifier":"SA73047","title":"Palo Alto Networks PAN-OS Multiple Vulnerabilities","released":"2016-10-12T13:33:30Z","modified_date":"2016-11-18T15:06:52Z","criticality":3,"criticality_description":"Moderately critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":8.3,"cvss_vector":"(AV:A/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-12T13:27:21Z","pretty_id":59,"custom_score":null,"last_updated":"2016-12-15T17:58:44Z"},{"id":384392,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":null,"advisory":{"id":195497,"advisory_identifier":"SA73048","title":"Palo Alto PAN-OS Denial of Service Vulnerabilities","released":"2016-10-12T13:34:07Z","modified_date":"2016-10-12T13:34:07Z","criticality":3,"criticality_description":"Moderately critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":7.8,"cvss_vector":"(AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-12T13:16:19Z","pretty_id":58,"custom_score":null,"last_updated":"2016-12-15T17:58:43Z"},{"id":384389,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":null,"advisory":{"id":195500,"advisory_identifier":"SA73049","title":"Palo Alto Networks PAN-OS Multiple Vulnerabilities","released":"2016-10-12T13:34:15Z","modified_date":"2016-11-21T14:05:00Z","criticality":2,"criticality_description":"Highly critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-12T12:53:45Z","pretty_id":57,"custom_score":null,"last_updated":"2016-12-15T17:58:43Z"},{"id":384387,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":null,"advisory":{"id":195506,"advisory_identifier":"SA73064","title":"Palo Alto Networks PAN-OS Multiple Vulnerabilities","released":"2016-10-12T13:34:22Z","modified_date":"2016-11-18T15:06:49Z","criticality":3,"criticality_description":"Moderately critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":8.3,"cvss_vector":"(AV:A/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-12T12:47:19Z","pretty_id":56,"custom_score":null,"last_updated":"2016-12-15T17:58:43Z"},{"id":384307,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":null,"advisory":{"id":195467,"advisory_identifier":"SA72999","title":"VMware vRealize Operations Manager (vROps) Security Bypass Vulnerability","released":"2016-10-12T10:59:50Z","modified_date":"2016-11-16T12:35:58Z","criticality":4,"criticality_description":"Less critical","solution_status":2,"solution_status_description":"Vendor Patched","where":2,"where_description":"From local network","cvss_score":7.7,"cvss_vector":"(AV:A/AC:L/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-12T12:23:31Z","pretty_id":55,"custom_score":null,"last_updated":"2016-12-15T17:58:43Z"},{"id":377026,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2430,"username":"user6@company.com"},"asset_list":{"id":4617,"name":"Windows Server (IT-DTS)"},"advisory":{"id":195447,"advisory_identifier":"SA72977","title":"Microsoft Products Multiple Vulnerabilities","released":"2016-10-11T20:51:13Z","modified_date":"2016-10-21T13:40:48Z","criticality":1,"criticality_description":"Extremely critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:H/RL:OF/RC:C)","type":0,"is_zero_day":true},"created":"2016-10-11T19:29:38Z","pretty_id":54,"custom_score":null,"last_updated":"2016-10-12T13:55:41Z"},{"id":377024,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2430,"username":"user6@company.com"},"asset_list":null,"advisory":{"id":195447,"advisory_identifier":"SA72977","title":"Microsoft Products Multiple Vulnerabilities","released":"2016-10-11T20:51:13Z","modified_date":"2016-10-21T13:40:48Z","criticality":1,"criticality_description":"Extremely critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:H/RL:OF/RC:C)","type":0,"is_zero_day":true},"created":"2016-10-11T19:29:24Z","pretty_id":53,"custom_score":null,"last_updated":"2016-10-12T13:55:20Z"},{"id":377021,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2430,"username":"user6@company.com"},"asset_list":{"id":4649,"name":"Desktop Software"},"advisory":{"id":195447,"advisory_identifier":"SA72977","title":"Microsoft Products Multiple Vulnerabilities","released":"2016-10-11T20:51:13Z","modified_date":"2016-10-21T13:40:48Z","criticality":1,"criticality_description":"Extremely critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:H/RL:OF/RC:C)","type":0,"is_zero_day":true},"created":"2016-10-11T19:29:12Z","pretty_id":52,"custom_score":null,"last_updated":"2016-10-12T13:54:36Z"},{"id":377019,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2430,"username":"user6@company.com"},"asset_list":{"id":4617,"name":"Windows Server (IT-DTS)"},"advisory":{"id":195450,"advisory_identifier":"SA72988","title":"Microsoft Windows Multiple Privilege Escalation Vulnerabilities","released":"2016-10-11T20:51:38Z","modified_date":"2016-10-21T13:41:59Z","criticality":4,"criticality_description":"Less critical","solution_status":2,"solution_status_description":"Vendor Patched","where":3,"where_description":"Local system","cvss_score":6.8,"cvss_vector":"(AV:L/AC:L/Au:S/C:C/I:C/A:C/E:F/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-11T19:28:56Z","pretty_id":51,"custom_score":null,"last_updated":"2016-10-12T13:53:51Z"},{"id":377017,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2430,"username":"user6@company.com"},"asset_list":null,"advisory":{"id":195450,"advisory_identifier":"SA72988","title":"Microsoft Windows Multiple Privilege Escalation Vulnerabilities","released":"2016-10-11T20:51:38Z","modified_date":"2016-10-21T13:41:59Z","criticality":4,"criticality_description":"Less critical","solution_status":2,"solution_status_description":"Vendor Patched","where":3,"where_description":"Local system","cvss_score":6.8,"cvss_vector":"(AV:L/AC:L/Au:S/C:C/I:C/A:C/E:F/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-11T19:28:42Z","pretty_id":50,"custom_score":null,"last_updated":"2016-10-12T13:53:37Z"}]}
  6. {"count":66,"next":"https://api.app.secunia.com/api/tickets/?page=3","previous":"https://api.app.secunia.com/api/tickets/","results":[{"id":377015,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2864,"name":"Low"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2430,"username":"user6@company.com"},"asset_list":{"id":4617,"name":"Windows Server (IT-DTS)"},"advisory":{"id":195453,"advisory_identifier":"SA72990","title":"Microsoft Windows Kernel Multiple Vulnerabilities","released":"2016-10-11T20:54:42Z","modified_date":"2016-10-25T12:34:19Z","criticality":4,"criticality_description":"Less critical","solution_status":2,"solution_status_description":"Vendor Patched","where":3,"where_description":"Local system","cvss_score":6.8,"cvss_vector":"(AV:L/AC:L/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-11T19:28:28Z","pretty_id":49,"custom_score":null,"last_updated":"2016-10-12T13:56:13Z"},{"id":377012,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2864,"name":"Low"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2430,"username":"user6@company.com"},"asset_list":null,"advisory":{"id":195453,"advisory_identifier":"SA72990","title":"Microsoft Windows Kernel Multiple Vulnerabilities","released":"2016-10-11T20:54:42Z","modified_date":"2016-10-25T12:34:19Z","criticality":4,"criticality_description":"Less critical","solution_status":2,"solution_status_description":"Vendor Patched","where":3,"where_description":"Local system","cvss_score":6.8,"cvss_vector":"(AV:L/AC:L/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-11T19:28:15Z","pretty_id":48,"custom_score":null,"last_updated":"2016-10-12T13:56:25Z"},{"id":377009,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2430,"username":"user6@company.com"},"asset_list":{"id":4617,"name":"Windows Server (IT-DTS)"},"advisory":{"id":195456,"advisory_identifier":"SA72996","title":"Microsoft Windows Flash Player Multiple Vulnerabilities","released":"2016-10-11T20:55:43Z","modified_date":"2016-10-11T20:55:43Z","criticality":2,"criticality_description":"Highly critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-11T19:28:00Z","pretty_id":47,"custom_score":null,"last_updated":"2016-10-12T13:56:35Z"},{"id":377007,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2430,"username":"user6@company.com"},"asset_list":null,"advisory":{"id":195456,"advisory_identifier":"SA72996","title":"Microsoft Windows Flash Player Multiple Vulnerabilities","released":"2016-10-11T20:55:43Z","modified_date":"2016-10-11T20:55:43Z","criticality":2,"criticality_description":"Highly critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-11T19:27:47Z","pretty_id":46,"custom_score":null,"last_updated":"2016-10-12T13:56:44Z"},{"id":377004,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2430,"username":"user6@company.com"},"asset_list":{"id":4649,"name":"Desktop Software"},"advisory":{"id":195459,"advisory_identifier":"SA72985","title":"Microsoft Multiple Products RTF Memory Corruption Vulnerability","released":"2016-10-11T21:03:39Z","modified_date":"2016-10-11T21:03:39Z","criticality":1,"criticality_description":"Extremely critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:H/RL:OF/RC:C)","type":0,"is_zero_day":true},"created":"2016-10-11T19:27:33Z","pretty_id":45,"custom_score":null,"last_updated":"2016-10-12T13:57:08Z"},{"id":375969,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2430,"username":"user6@company.com"},"asset_list":null,"advisory":{"id":195436,"advisory_identifier":"SA72987","title":"Microsoft Windows Microsoft Video Control Code Execution Vulnerability","released":"2016-10-11T20:21:38Z","modified_date":"2016-10-11T20:21:38Z","criticality":2,"criticality_description":"Highly critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-11T18:53:00Z","pretty_id":44,"custom_score":null,"last_updated":"2016-10-12T13:57:17Z"},{"id":375967,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2430,"username":"user6@company.com"},"asset_list":{"id":4617,"name":"Windows Server (IT-DTS)"},"advisory":{"id":195444,"advisory_identifier":"SA72995","title":"Microsoft Windows Internet Messaging API Information Disclosure Vulnerability","released":"2016-10-11T20:40:24Z","modified_date":"2016-10-11T20:40:24Z","criticality":3,"criticality_description":"Moderately critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":5.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:P/I:N/A:N/E:F/RL:OF/RC:C)","type":0,"is_zero_day":true},"created":"2016-10-11T18:52:56Z","pretty_id":43,"custom_score":null,"last_updated":"2016-10-12T13:57:26Z"},{"id":375964,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2430,"username":"user6@company.com"},"asset_list":null,"advisory":{"id":195444,"advisory_identifier":"SA72995","title":"Microsoft Windows Internet Messaging API Information Disclosure Vulnerability","released":"2016-10-11T20:40:24Z","modified_date":"2016-10-11T20:40:24Z","criticality":3,"criticality_description":"Moderately critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":5.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:P/I:N/A:N/E:F/RL:OF/RC:C)","type":0,"is_zero_day":true},"created":"2016-10-11T18:52:53Z","pretty_id":42,"custom_score":null,"last_updated":"2016-10-12T13:57:37Z"},{"id":375344,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2430,"username":"user6@company.com"},"asset_list":null,"advisory":{"id":195435,"advisory_identifier":"SA72994","title":"Microsoft Windows Diagnostics Hub Standard Collector Service Privilege Escalation Vulnerability","released":"2016-10-11T19:42:25Z","modified_date":"2016-10-18T12:03:09Z","criticality":4,"criticality_description":"Less critical","solution_status":2,"solution_status_description":"Vendor Patched","where":3,"where_description":"Local system","cvss_score":6.8,"cvss_vector":"(AV:L/AC:L/Au:S/C:C/I:C/A:C/E:H/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-11T18:24:00Z","pretty_id":41,"custom_score":null,"last_updated":"2016-10-12T13:57:50Z"},{"id":375244,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2864,"name":"Low"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4657,"name":"PSS Middleware Environment"},"advisory":{"id":195378,"advisory_identifier":"SA72899","title":"Red Hat update for kernel","released":"2016-10-11T16:49:35Z","modified_date":"2016-10-11T16:49:35Z","criticality":4,"criticality_description":"Less critical","solution_status":2,"solution_status_description":"Vendor Patched","where":2,"where_description":"From local network","cvss_score":6.1,"cvss_vector":"(AV:A/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-11T16:59:32Z","pretty_id":40,"custom_score":null,"last_updated":"2016-12-15T17:58:43Z"},{"id":375241,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4657,"name":"PSS Middleware Environment"},"advisory":{"id":195381,"advisory_identifier":"SA72906","title":"Red Hat update for tomcat","released":"2016-10-11T16:49:47Z","modified_date":"2016-10-11T16:49:47Z","criticality":3,"criticality_description":"Moderately critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":9.3,"cvss_vector":"(AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-11T16:59:13Z","pretty_id":39,"custom_score":null,"last_updated":"2016-12-15T17:58:43Z"},{"id":375238,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4657,"name":"PSS Middleware Environment"},"advisory":{"id":195384,"advisory_identifier":"SA72910","title":"Red Hat update for tomcat6","released":"2016-10-11T16:50:19Z","modified_date":"2016-10-11T16:50:19Z","criticality":3,"criticality_description":"Moderately critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":7.5,"cvss_vector":"(AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-11T16:58:54Z","pretty_id":38,"custom_score":null,"last_updated":"2016-12-15T17:58:43Z"},{"id":375236,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2449,"username":"user7@company.com"},"asset_list":{"id":4649,"name":"Desktop Software"},"advisory":{"id":195422,"advisory_identifier":"SA72950","title":"Adobe Flash Player Multiple Vulnerabilities","released":"2016-10-11T17:43:27Z","modified_date":"2016-10-13T19:01:37Z","criticality":2,"criticality_description":"Highly critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-11T16:52:56Z","pretty_id":37,"custom_score":null,"last_updated":"2016-10-11T19:29:57Z"},{"id":375233,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2449,"username":"user7@company.com"},"asset_list":{"id":4649,"name":"Desktop Software"},"advisory":{"id":195426,"advisory_identifier":"SA72948","title":"Adobe Reader / Acrobat Multiple Vulnerabilities","released":"2016-10-11T17:52:31Z","modified_date":"2016-11-15T15:46:54Z","criticality":2,"criticality_description":"Highly critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-11T16:52:38Z","pretty_id":36,"custom_score":null,"last_updated":"2016-10-11T19:29:38Z"},{"id":373559,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4772,"name":"Datacom"},"advisory":{"id":195151,"advisory_identifier":"SA72869","title":"Cisco Multiple Nexus Series Switches NX-OS Border Gateway Protocol Denial of Service Vulnerability","released":"2016-10-06T15:42:09Z","modified_date":"2016-10-06T15:42:09Z","criticality":5,"criticality_description":"Not critical","solution_status":4,"solution_status_description":"Partial Fix","where":2,"where_description":"From local network","cvss_score":5.7,"cvss_vector":"(AV:A/AC:M/Au:N/C:N/I:N/A:C/E:U/RL:TF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-10T13:39:21Z","pretty_id":35,"custom_score":null,"last_updated":"2016-12-15T17:58:43Z"},{"id":373556,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4772,"name":"Datacom"},"advisory":{"id":195154,"advisory_identifier":"SA72870","title":"Cisco Multiple Nexus Series Switches NX-OS DHCP Denial of Service Vulnerability","released":"2016-10-06T15:42:37Z","modified_date":"2016-10-06T15:42:37Z","criticality":4,"criticality_description":"Less critical","solution_status":4,"solution_status_description":"Partial Fix","where":2,"where_description":"From local network","cvss_score":6.1,"cvss_vector":"(AV:A/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:TF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-10T13:23:15Z","pretty_id":34,"custom_score":null,"last_updated":"2016-12-15T17:58:42Z"},{"id":373374,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4772,"name":"Datacom"},"advisory":{"id":195157,"advisory_identifier":"SA72874","title":"Cisco Multiple Nexus Series Switches NX-OS DHCP Denial of Service Vulnerability","released":"2016-10-06T15:42:55Z","modified_date":"2016-10-06T15:42:55Z","criticality":4,"criticality_description":"Less critical","solution_status":4,"solution_status_description":"Partial Fix","where":2,"where_description":"From local network","cvss_score":6.1,"cvss_vector":"(AV:A/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:TF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-10T13:13:22Z","pretty_id":33,"custom_score":null,"last_updated":"2016-12-15T17:58:42Z"},{"id":373372,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4772,"name":"Datacom"},"advisory":{"id":195160,"advisory_identifier":"SA72879","title":"Cisco Multiple Nexus Series Switches NX-OS Security Bypass Vulnerability","released":"2016-10-06T15:43:16Z","modified_date":"2016-10-06T15:43:16Z","criticality":4,"criticality_description":"Less critical","solution_status":4,"solution_status_description":"Partial Fix","where":2,"where_description":"From local network","cvss_score":7.7,"cvss_vector":"(AV:A/AC:L/Au:S/C:C/I:C/A:C/E:U/RL:TF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-10T13:02:09Z","pretty_id":32,"custom_score":null,"last_updated":"2016-12-15T17:58:42Z"},{"id":372658,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4772,"name":"Datacom"},"advisory":{"id":195166,"advisory_identifier":"SA72964","title":"Cisco Catalyst 6500 Series Switches / 7600 Series Routers IOS Security Bypass Vulnerability","released":"2016-10-06T15:44:12Z","modified_date":"2016-10-06T15:44:12Z","criticality":3,"criticality_description":"Moderately critical","solution_status":1,"solution_status_description":"Unpatched","where":1,"where_description":"From remote","cvss_score":5.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:N/I:P/A:N/E:U/RL:U/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-07T15:03:36Z","pretty_id":31,"custom_score":null,"last_updated":"2016-12-15T17:58:42Z"},{"id":372657,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4772,"name":"Datacom"},"advisory":{"id":195169,"advisory_identifier":"SA72973","title":"Cisco Adaptive Security Appliance (ASA) DHCP Relay Denial of Service Vulnerability","released":"2016-10-06T15:44:20Z","modified_date":"2016-10-06T15:44:20Z","criticality":4,"criticality_description":"Less critical","solution_status":4,"solution_status_description":"Partial Fix","where":2,"where_description":"From local network","cvss_score":6.1,"cvss_vector":"(AV:A/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:TF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-07T14:53:39Z","pretty_id":30,"custom_score":null,"last_updated":"2016-12-15T17:58:42Z"}]}
  7. {"count":66,"next":"https://api.app.secunia.com/api/tickets/?page=4","previous":"https://api.app.secunia.com/api/tickets/?page=2","results":[{"id":372656,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2873,"name":"Urgent"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4772,"name":"Datacom"},"advisory":{"id":195175,"advisory_identifier":"SA72889","title":"Cisco Nexus 7000 Series Switches NX-OS OTV Buffer Overflow Vulnerability","released":"2016-10-06T17:42:01Z","modified_date":"2016-10-06T17:42:01Z","criticality":3,"criticality_description":"Moderately critical","solution_status":4,"solution_status_description":"Partial Fix","where":2,"where_description":"From local network","cvss_score":8.3,"cvss_vector":"(AV:A/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:TF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-07T14:48:28Z","pretty_id":29,"custom_score":null,"last_updated":"2016-10-07T14:48:28Z"},{"id":372654,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":null,"advisory":{"id":195251,"advisory_identifier":"SA72896","title":"VMware Horizon View Connection Server Directory Traversal Vulnerability","released":"2016-10-07T14:01:48Z","modified_date":"2016-10-12T11:00:55Z","criticality":4,"criticality_description":"Less critical","solution_status":2,"solution_status_description":"Vendor Patched","where":2,"where_description":"From local network","cvss_score":3.3,"cvss_vector":"(AV:A/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-07T13:55:40Z","pretty_id":28,"custom_score":null,"last_updated":"2016-12-15T17:58:42Z"},{"id":324008,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4659,"name":"Security Engineer Apps"},"advisory":{"id":195040,"advisory_identifier":"SA72844","title":"Pulse Connect Secure OpenSSL Multiple Denial of Service Vulnerabilities","released":"2016-10-05T11:45:15Z","modified_date":"2016-10-05T11:45:15Z","criticality":3,"criticality_description":"Moderately critical","solution_status":1,"solution_status_description":"Unpatched","where":1,"where_description":"From remote","cvss_score":7.8,"cvss_vector":"(AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:U/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-05T17:55:42Z","pretty_id":26,"custom_score":null,"last_updated":"2016-12-15T17:58:41Z"},{"id":324005,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4659,"name":"Security Engineer Apps"},"advisory":{"id":195046,"advisory_identifier":"SA72926","title":"Pulse Secure Network Connect OpenSSL SHA512 Denial of Service Vulnerability","released":"2016-10-05T11:45:22Z","modified_date":"2016-10-05T11:45:22Z","criticality":3,"criticality_description":"Moderately critical","solution_status":1,"solution_status_description":"Unpatched","where":1,"where_description":"From remote","cvss_score":7.8,"cvss_vector":"(AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:U/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-05T17:55:18Z","pretty_id":25,"custom_score":null,"last_updated":"2016-12-15T17:58:41Z"},{"id":324004,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4657,"name":"PSS Middleware Environment"},"advisory":{"id":195049,"advisory_identifier":"SA72821","title":"Red Hat update for kernel","released":"2016-10-05T11:51:34Z","modified_date":"2016-10-05T11:51:34Z","criticality":4,"criticality_description":"Less critical","solution_status":2,"solution_status_description":"Vendor Patched","where":3,"where_description":"Local system","cvss_score":6.8,"cvss_vector":"(AV:L/AC:L/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-05T17:50:29Z","pretty_id":24,"custom_score":null,"last_updated":"2016-12-15T17:58:41Z"},{"id":322427,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4649,"name":"Desktop Software"},"advisory":{"id":194748,"advisory_identifier":"SA72789","title":"Cisco Multiple Products OpenSSL Multiple Vulnerabilities","released":"2016-09-28T13:26:11Z","modified_date":"2016-09-28T13:26:11Z","criticality":3,"criticality_description":"Moderately critical","solution_status":1,"solution_status_description":"Unpatched","where":1,"where_description":"From remote","cvss_score":7.8,"cvss_vector":"(AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:U/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-04T16:39:51Z","pretty_id":23,"custom_score":null,"last_updated":"2016-12-15T17:58:41Z"},{"id":322415,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4772,"name":"Datacom"},"advisory":{"id":194824,"advisory_identifier":"SA72790","title":"Cisco IOS XE Network Address Translation (NAT) Denial of Service Vulnerability","released":"2016-09-29T14:46:30Z","modified_date":"2016-09-29T14:46:30Z","criticality":4,"criticality_description":"Less critical","solution_status":2,"solution_status_description":"Vendor Patched","where":2,"where_description":"From local network","cvss_score":6.1,"cvss_vector":"(AV:A/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-04T16:34:07Z","pretty_id":22,"custom_score":null,"last_updated":"2016-12-15T17:58:41Z"},{"id":321988,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4772,"name":"Datacom"},"advisory":{"id":194846,"advisory_identifier":"SA72793","title":"Cisco IOS / IOS XE AAA Service Denial of Service Vulnerability","released":"2016-09-29T15:36:33Z","modified_date":"2016-09-29T15:36:33Z","criticality":4,"criticality_description":"Less critical","solution_status":2,"solution_status_description":"Vendor Patched","where":2,"where_description":"From local network","cvss_score":6.1,"cvss_vector":"(AV:A/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-04T15:16:32Z","pretty_id":21,"custom_score":null,"last_updated":"2016-12-15T17:58:41Z"},{"id":321986,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4772,"name":"Datacom"},"advisory":{"id":194859,"advisory_identifier":"SA72755","title":"Cisco IOS / IOS XE Smart Install Memory Leak Vulnerability","released":"2016-09-29T15:55:21Z","modified_date":"2016-09-29T15:55:21Z","criticality":4,"criticality_description":"Less critical","solution_status":2,"solution_status_description":"Vendor Patched","where":2,"where_description":"From local network","cvss_score":6.1,"cvss_vector":"(AV:A/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-04T15:11:11Z","pretty_id":20,"custom_score":null,"last_updated":"2016-12-15T17:58:41Z"},{"id":321985,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4772,"name":"Datacom"},"advisory":{"id":194862,"advisory_identifier":"SA72756","title":"Cisco IOS / IOS XE Multiple Denial of Service Vulnerabilities","released":"2016-09-29T15:56:44Z","modified_date":"2016-09-29T15:56:44Z","criticality":3,"criticality_description":"Moderately critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":7.8,"cvss_vector":"(AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-04T15:06:13Z","pretty_id":19,"custom_score":null,"last_updated":"2016-12-15T17:58:40Z"},{"id":321983,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4772,"name":"Datacom"},"advisory":{"id":194865,"advisory_identifier":"SA72757","title":"Cisco IOS / IOS XE IP Detail Record Denial of Service Vulnerability","released":"2016-09-29T15:57:26Z","modified_date":"2016-09-29T15:57:26Z","criticality":4,"criticality_description":"Less critical","solution_status":2,"solution_status_description":"Vendor Patched","where":2,"where_description":"From local network","cvss_score":6.1,"cvss_vector":"(AV:A/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-04T15:00:44Z","pretty_id":18,"custom_score":null,"last_updated":"2016-12-15T17:58:40Z"},{"id":321980,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4772,"name":"Datacom"},"advisory":{"id":194880,"advisory_identifier":"SA72773","title":"Cisco Multiple Products IP Fragment Reassembly Denial of Service Vulnerability","released":"2016-09-29T17:14:35Z","modified_date":"2016-09-29T17:14:35Z","criticality":3,"criticality_description":"Moderately critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":7.8,"cvss_vector":"(AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-04T14:51:52Z","pretty_id":17,"custom_score":null,"last_updated":"2016-12-15T17:58:40Z"},{"id":321977,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4772,"name":"Datacom"},"advisory":{"id":194883,"advisory_identifier":"SA72792","title":"Cisco IOS DNS Forwarder Vulnerability","released":"2016-09-29T17:16:12Z","modified_date":"2016-09-29T17:16:12Z","criticality":3,"criticality_description":"Moderately critical","solution_status":2,"solution_status_description":"Vendor Patched","where":2,"where_description":"From local network","cvss_score":7.3,"cvss_vector":"(AV:A/AC:L/Au:N/C:P/I:P/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-04T14:45:04Z","pretty_id":16,"custom_score":null,"last_updated":"2016-12-15T17:58:40Z"},{"id":321974,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":null,"advisory":{"id":194976,"advisory_identifier":"SA72876","title":"Palo Alto PAN-OS Denial of Service Vulnerabilities","released":"2016-10-04T15:04:11Z","modified_date":"2016-11-01T14:25:00Z","criticality":3,"criticality_description":"Moderately critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":7.8,"cvss_vector":"(AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-04T14:37:42Z","pretty_id":15,"custom_score":null,"last_updated":"2016-12-15T17:58:40Z"},{"id":321971,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4657,"name":"PSS Middleware Environment"},"advisory":{"id":194980,"advisory_identifier":"SA72720","title":"Red Hat update for thunderbird","released":"2016-10-04T15:35:38Z","modified_date":"2016-10-04T15:35:38Z","criticality":2,"criticality_description":"Highly critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-04T14:19:34Z","pretty_id":14,"custom_score":null,"last_updated":"2016-12-15T17:58:40Z"},{"id":321345,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4657,"name":"PSS Middleware Environment"},"advisory":{"id":191968,"advisory_identifier":"SA71733","title":"Oracle Solaris Multiple Third Party Components Multiple Vulnerabilities","released":"2016-07-20T17:16:10Z","modified_date":"2017-02-13T12:45:36Z","criticality":2,"criticality_description":"Highly critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-04T12:28:40Z","pretty_id":13,"custom_score":null,"last_updated":"2016-12-15T17:58:40Z"},{"id":321344,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4657,"name":"PSS Middleware Environment"},"advisory":{"id":194898,"advisory_identifier":"SA72713","title":"Red Hat update for python-twisted-web","released":"2016-09-30T11:35:57Z","modified_date":"2016-09-30T11:35:57Z","criticality":3,"criticality_description":"Moderately critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":7.5,"cvss_vector":"(AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-04T12:23:46Z","pretty_id":12,"custom_score":null,"last_updated":"2016-12-15T17:58:40Z"},{"id":321341,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4657,"name":"PSS Middleware Environment"},"advisory":{"id":194807,"advisory_identifier":"SA72627","title":"Red Hat update for bind97","released":"2016-09-29T12:09:41Z","modified_date":"2016-09-29T12:09:41Z","criticality":3,"criticality_description":"Moderately critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":7.8,"cvss_vector":"(AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-04T12:22:52Z","pretty_id":11,"custom_score":null,"last_updated":"2016-12-15T17:58:39Z"},{"id":321338,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4657,"name":"PSS Middleware Environment"},"advisory":{"id":194810,"advisory_identifier":"SA72728","title":"Red Hat update for bind","released":"2016-09-29T12:09:56Z","modified_date":"2016-09-29T12:09:56Z","criticality":3,"criticality_description":"Moderately critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":7.8,"cvss_vector":"(AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-04T12:22:03Z","pretty_id":10,"custom_score":null,"last_updated":"2016-12-15T17:58:39Z"},{"id":321337,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4657,"name":"PSS Middleware Environment"},"advisory":{"id":194722,"advisory_identifier":"SA72635","title":"Red Hat update for openssl","released":"2016-09-28T12:39:51Z","modified_date":"2016-10-17T14:44:11Z","criticality":3,"criticality_description":"Moderately critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":7.8,"cvss_vector":"(AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-04T12:20:56Z","pretty_id":9,"custom_score":null,"last_updated":"2016-12-15T17:58:39Z"}]}
  8. {"count":66,"next":null,"previous":"https://api.app.secunia.com/api/tickets/?page=3","results":[{"id":321230,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2449,"username":"user7@company.com"},"asset_list":{"id":4649,"name":"Desktop Software"},"advisory":{"id":194895,"advisory_identifier":"SA72819","title":"Google Chrome Multiple Vulnerabilities","released":"2016-09-30T09:28:56Z","modified_date":"2016-09-30T09:28:56Z","criticality":2,"criticality_description":"Highly critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-10-03T19:05:01Z","pretty_id":8,"custom_score":null,"last_updated":"2016-10-04T13:00:05Z"},{"id":312852,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2449,"username":"user7@company.com"},"asset_list":{"id":4649,"name":"Desktop Software"},"advisory":{"id":194394,"advisory_identifier":"SA72600","title":"Apple Safari Multiple Vulnerabilities","released":"2016-09-21T11:29:26Z","modified_date":"2016-09-28T14:38:09Z","criticality":2,"criticality_description":"Highly critical","solution_status":1,"solution_status_description":"Unpatched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:U/RC:C)","type":0,"is_zero_day":false},"created":"2016-09-21T11:32:38Z","pretty_id":5,"custom_score":null,"last_updated":"2016-09-21T12:02:31Z"},{"id":312849,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4657,"name":"PSS Middleware Environment"},"advisory":{"id":194406,"advisory_identifier":"SA72669","title":"Red Hat update for firefox","released":"2016-09-21T12:59:46Z","modified_date":"2016-09-21T12:59:46Z","criticality":2,"criticality_description":"Highly critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-09-21T11:25:50Z","pretty_id":4,"custom_score":null,"last_updated":"2016-12-15T17:58:39Z"},{"id":312301,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4659,"name":"Security Engineer Apps"},"advisory":{"id":194372,"advisory_identifier":"SA72624","title":"Symantec Multiple Products Decomposer Engine RAR Multiple Vulnerabilities","released":"2016-09-20T15:08:36Z","modified_date":"2016-09-23T09:53:20Z","criticality":2,"criticality_description":"Highly critical","solution_status":2,"solution_status_description":"Vendor Patched","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)","type":0,"is_zero_day":false},"created":"2016-09-20T13:35:35Z","pretty_id":3,"custom_score":null,"last_updated":"2016-12-15T17:58:39Z"},{"id":288866,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2870,"name":"High"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":null,"advisory":{"id":192618,"advisory_identifier":"SA71966","title":"VMware Multiple Products vmhgfs.dll Insecure Library Loading Vulnerability","released":"2016-08-05T12:47:58Z","modified_date":"2016-09-20T12:04:25Z","criticality":2,"criticality_description":"Highly critical","solution_status":4,"solution_status_description":"Partial Fix","where":1,"where_description":"From remote","cvss_score":10.0,"cvss_vector":"(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:TF/RC:C)","type":0,"is_zero_day":false},"created":"2016-09-20T10:13:19Z","pretty_id":2,"custom_score":null,"last_updated":"2016-12-15T17:58:39Z"},{"id":288853,"name":null,"status":{"id":2963,"name":"Handled"},"priority":{"id":2867,"name":"Medium"},"queue":{"id":2144,"name":"Default"},"description":null,"assigned_to":{"id":2426,"username":"user1@company.com"},"asset_list":{"id":4649,"name":"Desktop Software"},"advisory":{